📖
Citizen Clinic
search
Ctrlk
  • Welcome to ​the Citizen Clinic Cybersecurity Education Center
  • Case Studies
  • Clinic Curriculum
    • Syllabus
    • Lesson Moduleschevron-right
      • Introduction to Public Interest Cybersecurity
      • Ethics and the Citizen Clinic Code of Conductchevron-right
      • Old School INFOSEC: Basic Controls
      • Digital Surveillance of Politically Vulnerable Organizations: The Threat Landscape
      • Problem Diagnosis and Reframing
      • Threat Modeling & Bounding Risk Assessments
      • Contextual & Capacity Researchchevron-right
      • Information Gathering
      • Open Source Research Methods, Safety, and Tools
      • Adversary Persona Development
      • Threat Scenario Development
      • Changing Security Behaviors
      • Social Engineering and Phishing
      • Designing Security Training
      • Psychosocial Resilience
      • Harmful Information (Misinformation and Harassment)chevron-right
    • Condensed Bibliography
  • Low-Resource Organizations
    • Introduction
    • Section 1: Why do Low-Risk Organizations Need Cybersecurity?
    • Section 2: Common Cybersecurity Controls
    • Section 3: Additional Cybersecurity Best Practices
    • Appendiceschevron-right
  • Clinic Infrastructure
    • Virtual Private Network (VPN)
    • Creating Virtual Identities
    • Security Evaluation Framework for OSINT Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Clinic Curriculum

Lesson Modules

Introduction to Public Interest Cybersecuritychevron-rightEthics and the Citizen Clinic Code of Conductchevron-rightOld School INFOSEC: Basic Controlschevron-rightDigital Surveillance of Politically Vulnerable Organizations: The Threat Landscapechevron-rightProblem Diagnosis and Reframingchevron-rightThreat Modeling & Bounding Risk Assessmentschevron-rightContextual & Capacity Researchchevron-rightInformation Gatheringchevron-rightOpen Source Research Methods, Safety, and Toolschevron-rightAdversary Persona Developmentchevron-rightThreat Scenario Developmentchevron-rightChanging Security Behaviorschevron-rightSocial Engineering and Phishingchevron-rightDesigning Security Trainingchevron-rightPsychosocial Resiliencechevron-rightHarmful Information (Misinformation and Harassment)chevron-right
PreviousSyllabuschevron-leftNextIntroduction to Public Interest Cybersecuritychevron-right

Last updated 3 years ago