Cyberwomen is a digital self-defense guide and curriculum with a holistic and gender perspective, aimed at offering learning experiences to women human right defenders that work in high-risk environments
The guide is made up of training modules and recommendations focused on specific contexts. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.
Cyberwomen includes interactive games, as well as audio-visual and graphic materials, as instructional aids for trainers. You can download this guide from the site and learn more about it's methodology and training modules, in addition to other useful resources.
Designed to support an ambiance of woman-to-woman confidence and trust in a training setting.
Focus on sharing real-life instances of digital attacks - as experienced by women human rights defenders, activists and journalists - using empowering testimonies.
"Strategic thinking about digital security": sharing digital security concepts with participants, rather than just training on a list of tools.
We use examples of YouTube videos, messages on various social media platforms, and outputs emerging from other training sessions in order to hold a safer space for discussion and reflection on technology-based violence that specifically targets women.
This curriculum considers emotional well-being and self-care as a vital element of security for WHRDs.
Carrying out a needs assessment ahead of your training, by working either with the training participants themselves or with a member of their representing organization.
Pre-training assessment questionnaire that uses a quantifiable scoring mechanism to gauge participants’ existing digital security skill level, while also providing qualitative information on strengths and areas for improvement at a more granular, practice-specific level. DISC Tool is also a useful way to track their learning and comprehension progress.Read more
In the event that you’re not able to perform a pre-training assessment directly, or have these questions answered, you can still infer quite a bit of background information from what you do know about participants’ context and circumstances.
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.Read more
Pre-training assessment questionnaire that uses a quantifiable scoring mechanism to gauge participants’ existing digital security skill level, while also providing qualitative information on strengths and areas for improvement at a more granular, practice-specific level.Read more
Illustrates cases related to harrasment, threats, information theft (phishing), identity theft, profile deactivation and real identity exposure, forceful entry, server attacks...Download PDF