"Cyberwomen is a digital security curriculum with a holistic and gender perspective, geared towards both professional trainers and those who want to learn how to train others on their digital protection and include gender considerations as they do so. It is made up of training modules, interactive games and recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids." (https://iwpr.net)
I. INTRODUCTION, 15
Introduction to Cyberwomen -- Planning resources -- Acknowledgments
II. TRUST-BUILDING EXERCISES, 31
The rules of the game -- Defenders bingo -- Tricky candy -- Who do you trust?
III. RETINKING OUR RELATIONSHIP WITH TECHNOLOGY, 45
Personal perceptions of security -- Your rights, your technology -- Her-story of technology
IV. DIGITAL SECURITY BASICS I., 67
How does the internet work? -- Building stronger passwords -- Malware and viruses -- Safe browsing -- How to secure your computer
V. PRIVACY, 99
Ask me anything! -- Privacy -- Networked publics -- Apps and online platforms
VI. SAFE ONLINE ADVOCACY, 121
Safer websites -- Safe online campaigning -- What does your metadata say about you?
VII. SAFER MOBILES, 141
Marco Polo -- Mobile phones 1 -- Mobile phones 2
VIII. ANONYMITY, 153
Secret friend -- Anonymity -- More online identities!
IX. ENCRYPTION, 169
Introduction to encryption -- Encrypted communication
X. DIGITAL SECURITY BASICS II, 181
Storage and encryption -- Let's reset
XI. ONLINE VIOLENCE AGAINST WOMEN, 195
Spectogram -- A feminist internet -- Symbolic violence -- Reporting abuse on social media platforms -- Let's start a documentation journal! -- Doxxing the troll
XII. SEXTING, 229
Time to watch! -- Sexting
XIII. DETERMINING THE BEST SOLUTION, 239
Gender-based risk model -- Digital security decisions -- I decide
XIV. PLANNING AHEAD, 261
Organizational security plans and protocols -- Digital security plans and protocols
XV. SELF-CARE, 275
Building feminist self-care -- The loving touch -- Look -- Our reflection -- The act of NO -- Love letter to myself
XVI. CLOSING AND REVIEW EXERCISES, 295
Witch coven -- The cauldron -- Feminist flowers -- Magic circle -- Charades -- DigiSec rally
XVII. APPENDIX, 319
IWPR’s Digital Security and Capacity Tool (DISC)
Example training agendas