๐Ÿ“–
Citizen Clinic
  • Welcome to โ€‹the Citizen Clinic Cybersecurity Education Center
  • Case Studies
  • Clinic Curriculum
    • Syllabus
    • Lesson Modules
      • Introduction to Public Interest Cybersecurity
      • Ethics and the Citizen Clinic Code of Conduct
        • Citizen Clinic Student Code of Conduct
      • Old School INFOSEC: Basic Controls
      • Digital Surveillance of Politically Vulnerable Organizations: The Threat Landscape
      • Problem Diagnosis and Reframing
      • Threat Modeling & Bounding Risk Assessments
      • Contextual & Capacity Research
        • Contextual Assessment Informational Requirements
        • PESTLE M Worksheet
      • Information Gathering
      • Open Source Research Methods, Safety, and Tools
      • Adversary Persona Development
      • Threat Scenario Development
      • Changing Security Behaviors
      • Social Engineering and Phishing
      • Designing Security Training
      • Psychosocial Resilience
      • Harmful Information (Misinformation and Harassment)
        • Fictional Case Studies
        • Mitigation Framework
    • Condensed Bibliography
  • Low-Resource Organizations
    • Introduction
    • Section 1: Why do Low-Risk Organizations Need Cybersecurity?
    • Section 2: Common Cybersecurity Controls
    • Section 3: Additional Cybersecurity Best Practices
    • Appendices
      • Appendix A: Building a Security Policy for Your Organization
      • Appendix B: Implementation Guidance
      • Appendix C: Moving Beyond the Baseline
  • Clinic Infrastructure
    • Virtual Private Network (VPN)
    • Creating Virtual Identities
    • Security Evaluation Framework for OSINT Tools
Powered by GitBook
On this page
  1. Clinic Curriculum

Lesson Modules

Introduction to Public Interest CybersecurityEthics and the Citizen Clinic Code of ConductOld School INFOSEC: Basic ControlsDigital Surveillance of Politically Vulnerable Organizations: The Threat LandscapeProblem Diagnosis and ReframingThreat Modeling & Bounding Risk AssessmentsContextual & Capacity ResearchInformation GatheringOpen Source Research Methods, Safety, and ToolsAdversary Persona DevelopmentThreat Scenario DevelopmentChanging Security BehaviorsSocial Engineering and PhishingDesigning Security TrainingPsychosocial ResilienceHarmful Information (Misinformation and Harassment)
PreviousSyllabusNextIntroduction to Public Interest Cybersecurity

Last updated 3 years ago