All Projects → securityfirst → championscurriculum

securityfirst / championscurriculum

Licence: other
A training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessment. (Work in progress)

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to championscurriculum

diwa
A Deliberately Insecure Web Application
Stars: ✭ 32 (+77.78%)
Mutual labels:  training, education, infosec
The Complete Guide To Modern Javascript
A comprehensive, easy-to-follow ebook to learn everything from the basics of JavaScript to ES2020. Read more on my blog https://inspiredwebdev.com or buy it here http://a-fwd.to/jHO6m9t. Get the course here https://www.educative.io/courses/complete-guide-to-modern-javascript?aff=BqmB
Stars: ✭ 827 (+4494.44%)
Mutual labels:  training, education
Open Solution Value Prediction
Open solution to the Santander Value Prediction Challenge 🐠
Stars: ✭ 34 (+88.89%)
Mutual labels:  training, education
Openolat
Learning Management System OpenOlat
Stars: ✭ 135 (+650%)
Mutual labels:  training, education
Dvwa
Damn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+31716.67%)
Mutual labels:  training, infosec
Inginious
INGInious is a secure and automated exercises assessment platform using your own tests, also providing a pluggable interface with your existing LMS.
Stars: ✭ 138 (+666.67%)
Mutual labels:  training, education
Minerva Training Materials
Learn advanced data science on real-life, curated problems
Stars: ✭ 37 (+105.56%)
Mutual labels:  training, education
training-materials
No description or website provided.
Stars: ✭ 47 (+161.11%)
Mutual labels:  training, infosec
DDTTX
DDTTX Tabletop Trainings
Stars: ✭ 22 (+22.22%)
Mutual labels:  training, infosec
TIWAP
Totally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (+661.11%)
Mutual labels:  training, infosec
curriculum-foundation
iSAQB Curriculum for the CPSA - Foundation Level. This repository contains copyrighted work.
Stars: ✭ 35 (+94.44%)
Mutual labels:  training, education
Main
Management materials and content
Stars: ✭ 32 (+77.78%)
Mutual labels:  training, education
CollegeCompendium
📓 A curated collection of free public Computer Science classes from colleges across America
Stars: ✭ 791 (+4294.44%)
Mutual labels:  education
workshoppers
Zero to Hero with Node.js Africa Code Guide for JavaScript and Node.js
Stars: ✭ 16 (-11.11%)
Mutual labels:  training
zwift-workout-file-reference
Reference documentation for the Zwift workout file format
Stars: ✭ 54 (+200%)
Mutual labels:  training
EduData
Edudata: Datasets in Education and convenient interface for downloading and preprocessing dataset in education
Stars: ✭ 39 (+116.67%)
Mutual labels:  education
tiny-framework
A light wight easy to use RESTful apis framework for education & demo purposes. stripped down framework to the fundamental components that that every one would essentially need to (learn / make a demo application).
Stars: ✭ 13 (-27.78%)
Mutual labels:  education
FlipED
A LMS built specifically for Thailand's Education 4.0 system.
Stars: ✭ 24 (+33.33%)
Mutual labels:  education
T1tl3
A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title
Stars: ✭ 14 (-22.22%)
Mutual labels:  infosec
Kali-Linux-Tools-Interface
Graphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (+838.89%)
Mutual labels:  education

WORK IN PROGRESS

Welcome

Welcome to the information security champion training and basic assessment curriculum. The current working title for this project is OctoC - Curriculum for Creating Cyber-Security Champions and Compliance Checking in Civil Communities

Yes we know we used the word "Cyber" but the acronym was tricky to think up - open to better suggestions! :)

The project is a partnership between the Institute for War and Peace Reporting and Security First. It is currently not yet finished and there is a lot of work still to do, especially around structure and language. We also need to test the lessons in the field. We warmly welcome any feedback, ideas (especially for the activities parts of the lessons), criticism or just general thoughts. Probably the best way to reach us is a Github issue or email [email protected].

Who is this curriculum for?

This curriculum is designed as a tool for trainers working with people within small NGOs and media organisations who find themselves tasked with the management of the day to day running of secure and private information.

Often these individuals are described as "champions." These people begin this often informal role by being the office "techie" or "printer-fixer" - a person who might not have received formal training before but find themselves dealing with many of the day to day information security concepts.

Though most of the learning will be hands-on and participants won't need to be technical specialists to understand, this course is primarily about taking people who already understand some core concepts and giving them more skills to be able to manage more effectively.

At a minimum, we suggest that participants already have a basic knowledge of tools and techniques listed in or already conducted training similar to the content found resources such as:

Why create this course?

This course was created to help fill an identified need within the trainer community. We currently have many resources available for educating users (such as Level-Up), for implementing issues of organisational security (OrgSec community) and for auditing an organisation's security (SAFETAG). What we were missing though, was a curriculum to help people begin to learn how to manage an organisation's information security. That is what this curriculum aims to provide.

How does it work?

The range of knowledge needed to manage information security is enormous and often outside the realm of what any individual could master even with years of training. As such, the curriculum is designed to:

  • Introduce individuals to a topic
  • Develop a familiarity with key approaches to dealing with the topic within their environment through class interaction and hands-on research
  • Leave a topic with a basic knowledge, resources and a developed support network that they can utilise for implementation at a later stage.

Throughout the course, each participant also conducts a basic assessment of their own organisation that they build on for each module that they cover. This helps to a participant to maximise the utility of the course to their own circumstances and leave with an action plan for implementation at a later stage. So for example, a module on privacy will introduce some core concepts, then individuals conduct group work on what's relevant for their individual circumstance, assess how their own organisations deal with the issue and then record this and recommended actions in their assessment for use at a later date.

This trainer curriculum follows the standard pedagogy approach to adult learning adopted by many within the information security training community - such as Level-Up.

This breaks down each lesson into the following five areas:

  • Activity - a learning task for the group to conduct
  • Discussion - about the module
  • Inputs - related lecture or background material
  • Deepening - the hands-on portion of the module
  • Synthesis - summary and wrap-up. For this curriculum, this is also where participants fill out the assessment.

Trainers should consult "Recommended Preparations" before presenting each module. Most require secure WiFi. Remind participants to bring devices and chargers.

How long does it take?

The course is designed to be modular. Each module comes with a suggested time. Allowing individual modules to be taken alone or a full course to be run. How long the course takes depends on many factors such as language, existing skills etc. However, we aim to make the entire course last at most five days.

What does it cover?

It is not just about digital issues but also addresses things such as the security of physical information like paper documentation. We also discuss the important issues of how to design projects to ensure responsible collection of data and the ensuring privacy by design within projects.

The course is broken into the following sections:

Introduction
Mapping information, assessing the threat environment and modelling
Privacy regulation and requirements
User Education
Encryption, Patching, Licensing
Network Management, Monitoring, WiFi and Logs
Communications
Web and Email Management
Password Management
Mobile Device Management / BYOD
Travel
Resilience and Backups
Policy Creation and Implementation
Physical Security
Responding to Incidents
Basic audits
Community structures and resources for further learning

Licence

This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].