{"version":1,"pages":[{"id":"AtaApMdxAYVdD0VuQP9T","title":"Welcome to ​the Citizen Clinic Cybersecurity Education Center","pathname":"/","siteSpaceId":"sitesp_qS7yR","description":""},{"id":"h3AQHJhGewfeC4Yzdo24","title":"Case Studies","pathname":"/case-studies","siteSpaceId":"sitesp_qS7yR","description":""},{"id":"iccV6CONlovda65bXXY2","title":"Syllabus","pathname":"/clinic-curriculum/syllabus","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"}]},{"id":"ecp58i8PZgwusrIBS9bm","title":"Lesson Modules","pathname":"/clinic-curriculum/lesson-modules","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"}]},{"id":"22cDRvYDQwPGoaUSJCrV","title":"Introduction to Public Interest Cybersecurity","pathname":"/clinic-curriculum/lesson-modules/introduction-to-public-interest-cybersecurity","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"SC016plQgFDMswjIUqTq","title":"Ethics and the Citizen Clinic Code of Conduct","pathname":"/clinic-curriculum/lesson-modules/ethics-and-the-citizen-clinic-code-of-conduct","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"Ijjj5gFJDzBdzusimz5Q","title":"Citizen Clinic Student Code of Conduct","pathname":"/clinic-curriculum/lesson-modules/ethics-and-the-citizen-clinic-code-of-conduct/citizen-clinic-student-code-of-conduct","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"},{"label":"Ethics and the Citizen Clinic Code of Conduct"}]},{"id":"1Q0lcRW7aaqgY0VCj8WJ","title":"Old School INFOSEC: Basic Controls","pathname":"/clinic-curriculum/lesson-modules/old-school-infosec-basic-controls","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"iTgVpkLoSWEPhUEyPMnV","title":"Digital Surveillance of Politically Vulnerable Organizations: The Threat Landscape","pathname":"/clinic-curriculum/lesson-modules/digital-surveillance-of-politically-vulnerable-organizations-the-threat-landscape","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"3uMUSa8Y6DpHDt7wZbJg","title":"Problem Diagnosis and Reframing","pathname":"/clinic-curriculum/lesson-modules/problem-diagnosis-and-reframing","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"ZBFeflyJo0GU19WiK63S","title":"Threat Modeling & Bounding Risk Assessments","pathname":"/clinic-curriculum/lesson-modules/threat-modeling-and-bounding-risk-assessments","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"yPOl1AwUPqVZlu96OtCm","title":"Contextual & Capacity Research","pathname":"/clinic-curriculum/lesson-modules/contextual-and-capacity-research","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"qdSYxcqvZvePvIuCGls7","title":"Contextual Assessment Informational Requirements","pathname":"/clinic-curriculum/lesson-modules/contextual-and-capacity-research/contextual-assessment-informational-requirements","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"},{"label":"Contextual & Capacity Research"}]},{"id":"yogMMvYArsPD3bL806xG","title":"PESTLE M Worksheet","pathname":"/clinic-curriculum/lesson-modules/contextual-and-capacity-research/pestle-m-worksheet","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"},{"label":"Contextual & Capacity Research"}]},{"id":"wjabt4dZVhUtS0g9ZA8n","title":"Information Gathering","pathname":"/clinic-curriculum/lesson-modules/information-gathering","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"74pLtKQvbvDl4AGQXvJu","title":"Open Source Research Methods, Safety, and Tools","pathname":"/clinic-curriculum/lesson-modules/open-source-research-methods-safety-and-tools","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"e6okSAI7u3Ct1oul7Zd0","title":"Adversary Persona Development","pathname":"/clinic-curriculum/lesson-modules/adversary-persona-development","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"sbmqjUquEJ5O5ZdSBZRL","title":"Threat Scenario Development","pathname":"/clinic-curriculum/lesson-modules/threat-scenario-development","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"0oPo3laHD9UO4L1s3MvP","title":"Changing Security Behaviors","pathname":"/clinic-curriculum/lesson-modules/changing-security-behaviors","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"EsYEYoRTZ70UOHbWR4ir","title":"Social Engineering and Phishing","pathname":"/clinic-curriculum/lesson-modules/social-engineering-and-phishing","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"NeNbbR120UFfnTAADQ4l","title":"Designing Security Training","pathname":"/clinic-curriculum/lesson-modules/designing-security-training","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"2C1x5xRukML2Yz6K9MQL","title":"Psychosocial Resilience","pathname":"/clinic-curriculum/lesson-modules/psychosocial-resilience","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"sNPhaSl6l8Gb7AR5E7Q9","title":"Harmful Information (Misinformation and Harassment)","pathname":"/clinic-curriculum/lesson-modules/harmful-information-misinformation-and-harassment","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"}]},{"id":"KI0k9PAFodhRZFgY4YkO","title":"Fictional Case Studies","pathname":"/clinic-curriculum/lesson-modules/harmful-information-misinformation-and-harassment/fictional-case-studies","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"},{"label":"Harmful Information (Misinformation and Harassment)"}]},{"id":"6fcYxEFpaLuwyeadRK11","title":"Mitigation Framework","pathname":"/clinic-curriculum/lesson-modules/harmful-information-misinformation-and-harassment/mitigation-framework","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"},{"label":"Lesson Modules"},{"label":"Harmful Information (Misinformation and Harassment)"}]},{"id":"r7e1kk1sqYr5Hhycue3g","title":"Condensed Bibliography","pathname":"/clinic-curriculum/condensed-bibliography","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Curriculum"}]},{"id":"RfKcDrs3YVS9mbDeYMjO","title":"Introduction","pathname":"/low-resource-organizations/introduction","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Low-Resource Organizations"}]},{"id":"Nquro7gXq6USxQyvUYKV","title":"Section 1: Why do Low-Risk Organizations Need Cybersecurity?","pathname":"/low-resource-organizations/section-1-why-do-low-risk-organizations-need-cybersecurity","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Low-Resource Organizations"}]},{"id":"csMVCkcSOqIyIqvwCmbY","title":"Section 2: Common Cybersecurity Controls","pathname":"/low-resource-organizations/section-2-common-cybersecurity-controls","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Low-Resource Organizations"}]},{"id":"5WyEx8KAOQoMQBR67MGD","title":"Section 3: Additional Cybersecurity Best Practices","pathname":"/low-resource-organizations/section-3-additional-cybersecurity-best-practices","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Low-Resource Organizations"}]},{"id":"661I8TAqz154LpC5RzMp","title":"Appendices","pathname":"/low-resource-organizations/appendices","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Low-Resource Organizations"}]},{"id":"qpeKPnit78IulUQIrXqQ","title":"Appendix A: Building a Security Policy for Your Organization","pathname":"/low-resource-organizations/appendices/appendix-a-building-a-security-policy-for-your-organization","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Low-Resource Organizations"},{"label":"Appendices"}]},{"id":"svK2fTOaM7bE19eP0KIT","title":"Appendix B: Implementation Guidance","pathname":"/low-resource-organizations/appendices/appendix-b-implementation-guidance","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Low-Resource Organizations"},{"label":"Appendices"}]},{"id":"AUZWooJDsJzb6JvrxHYE","title":"Appendix C: Moving Beyond the Baseline","pathname":"/low-resource-organizations/appendices/appendix-c-moving-beyond-the-baseline","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Low-Resource Organizations"},{"label":"Appendices"}]},{"id":"JoHXB1h065Yhq8M2R5tk","title":"Virtual Private Network (VPN)","pathname":"/clinic-infrastructure/virtual-private-network-vpn","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Infrastructure"}]},{"id":"36e1FyNWhkfLmjZsJ8h6","title":"Creating Virtual Identities","pathname":"/clinic-infrastructure/creating-virtual-identities","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Infrastructure"}]},{"id":"ok1GIMGoVLI8cmqkpzIb","title":"Security Evaluation Framework for OSINT Tools","pathname":"/clinic-infrastructure/security-evaluation-framework-for-osint-tools","siteSpaceId":"sitesp_qS7yR","description":"","breadcrumbs":[{"label":"Clinic Infrastructure"}]}]}