04-05 July 2018, Dhaka, Bangladesh
Vanue: Daily Star Center, Dhaka, Bangladesh
Facilitator: Mr. Brian Conley
List of Workshop Participant
Program Schedule
DAY ONE | 04 July 2018 |
---|---|
09:30-10:00am | Registration, fill out a short survey about your concerns and current work practices to protect your work and your sources. |
10:00-10:45 am | Introduction, Discussion about mobile and computer security – tell us one thing that worries you about using mobiles or computers you’re worried about, and two things you do to protect yourself or your sources. |
10:45 am -11:00 am | Presentation – How do Mobile Phones work?
Activity – Diagram the risks caused by how mobile phones work, if time allows, go beyond tracking, collecting call and SMS data. Do apps cause risks? What about all the data you keep inside that phone? |
11:15-11:30 am | Presentation – Some tools you can use to protect your calls, texts, and sources. WhatsApp, Signal, Zom (Wire, others?) |
11:30-11:45am | TEA BREAK |
11:45 am -12:15 pm | Activity – Install these apps, add some contacts. |
12:15-1.30 pm | Presentation – Why do these tools work? A little thing called Encryption Activity – Small group discussions “What are the weak points in Encryption?” |
1:30-2:30 pm | LUNCH BREAK |
2:30-2:45 pm | Presentation – Solutions to weak points in encryption Activity – Small group discussions “What did Bob and Alice do wrong?” Review a group of scenarios and identify the weak points. |
2:45-3:00 pm | Presentation – What makes a strong password? How are passwords/pins /swipe /fingerprint locks different? |
3:00-3:15 pm | TEA BREAK |
3:15-3:30 pm | Activity – Design a strong password, implement protections on your device |
3:30-4:00 pm | Presentation – What about email? Introduce pgp, Protonmail and Mailvelope Activity – Setup Mailvelope, Protonmail (depending on preference) |
4:00-5:00 pm | Homework + Q & A |
DAY TWO | 05 July 2018 |
---|---|
09:30 – 10:00 am | Q & A – What are you confused by so far? |
10:00 – 10:45 am | RECAP Presentation – What are the most common attacks? |
10:45 – 11.15 am | Activity – Identify the risk/attack vector in series of scenarios |
11:15 – 11.30 am | Presentation / Q & A – What to do about malware? |
11:30-11:45 am | TEA BREAK |
11:45-12:15 pm | Presentation / Q & A – What to do about confiscation/theft/loss of device, equipment, or data? |
12:15-12:45 pm | Activity – Install Duck Duck Go App, Orfox / Firefox (secondary browsing app), virus software (Sophos, Avast), VeraCrypt Activity – Set up VeraCrypt |
12:45-2:30 pm | LUNCH BREAK |
2:30-2:45 pm | RECAP |
2:45-3:00 pm | RECAP Cont. |
3:00-3:15 pm | TEA BREAK |
3:15-3:30 pm | Q & A, Support, Additional tools |
3:30-4:00 pm | End of the Training |