Resources for the global digital safety training community.
You, The Trainer
Be a Better Trainer
First 3 Sessions of Your Event
Developing a Shared Brain
Developing Shared Agreements
Sharing Your Story
Golden Rules of Effective Training
How To Handle Surprises During Training
Icebreakers, Energizers and Thematic Activities
Icebreakers
Thematic Activities
Charades!
DigiSec Rally
Her-Story of Technology
Magic Circle
Spectrogram
The Cauldron
Witch Coven
Roles and Responsibilities of a Digital Security Trainer
Setting Expectations For Participants, Organizers, and Yourself
Trust Building Exercises
Defenders Bingo
The Rules of the Game
Tricky Candy
Who Do You Trust?
Before an Event
Creating Safe Spaces
LevelUp's Approach to Adult Learning
Planning Your Event Agenda
The Participant-Driven Agenda
Planning Your Training Event
Step 0 - The Go or Don't Go Decision
Step 1 - Initial Contact and Assessing Need
Step 2 - Context and Risk Analysis
Step 3 - Analysis and Design Considerations
Step 4 - Communications and Content Planning
Step 5 - Orientation and Preparation
Psychosocial Underpinnings of Security Training
Getting to Grips with Fear
Using the Anxiety Pressure Gauge
Raising and Lowering the Pressure in a Group
Stress and Traumatic Stress Reactions in Security Training
Building your Own Emotional Resilience as a Security Trainer
Supporting Self-Care
Building Feminist Self-Care
Look
Love Letter to Myself
Our Reflection
The Act of NO
The Loving Touch
How To: Using the LevelUp Trainers' Curriculum
How-To: Preparing Sessions Using ADIDS
Trainers' Curriculum
Assessing Risks and Solutions
Security Plans and Protocols
Malware Protection
Safer Software Updating
Using Antivirus Tools
Mobile Safety
How Mobile Networks Work
Protecting Data
Creating and Managing Strong Passwords
Data Backup Basics
Protecting and Encrypting Devices
Rethinking Security
Digital Security: Motivations, Resistances and Barriers
Safer Browsing
Safer Browsing - Anonymity and Circumvention
Safer Browsing - HTTPS and SSL
Safer Browsing - Identity Protection and Privacy
Safer Communication
Safer Communication: PGP/GPG Email Encryption
Safer Online Advocacy
Safer Workspaces
Safer Workspaces - Using Tails
Social Media Safety
Social Media Safety Awareness
After an Event
How Are We Evaluating our Trainings?
Community
Level Up Code of Conduct
Community Resources and Tools
Contributing to LevelUp
Getting Started with LevelUp
Partners and Collaborators
About LevelUp
Home
Site Map
Site Map
You, The Trainer
Be a Better Trainer
First 3 Sessions of Your Event
Developing a Shared Brain
Developing Shared Agreements
Sharing Your Story
Golden Rules of Effective Training
How To Handle Surprises During Training
Icebreakers, Energizers and Thematic Activities
Icebreakers
Thematic Activities
Charades!
DigiSec Rally
Her-Story of Technology
Magic Circle
Spectrogram
The Cauldron
Witch Coven
Roles and Responsibilities of a Digital Security Trainer
Setting Expectations For Participants, Organizers, and Yourself
Trust Building Exercises
Defenders Bingo
The Rules of the Game
Tricky Candy
Who Do You Trust?
Before an Event
Creating Safe Spaces
LevelUp's Approach to Adult Learning
Planning Your Event Agenda
The Agenda Checklist
The Participant-Driven Agenda
Trainer Coordination Checklist
Planning Your Training Event
Step 0 - The Go or Don't Go Decision
Step 1 - Initial Contact and Assessing Need
Step 2 - Context and Risk Analysis
Step 3 - Analysis and Design Considerations
Step 4 - Communications and Content Planning
Step 5 - Orientation and Preparation
Psychosocial Underpinnings of Security Training
Getting to Grips with Fear
Using the Anxiety Pressure Gauge
Raising and Lowering the Pressure in a Group
Stress and Traumatic Stress Reactions in Security Training
Building your Own Emotional Resilience as a Security Trainer
Supporting Self-Care
Building Feminist Self-Care
Look
Love Letter to Myself
Our Reflection
The Act of NO
The Loving Touch
How To: Using the LevelUp Trainers' Curriculum
How-To: Preparing Sessions Using ADIDS
Trainers' Curriculum
Assessing Risks and Solutions
Security Plans and Protocols
Malware Protection
Safer Software Updating
Using Antivirus Tools
Mobile Safety
How Mobile Networks Work
Protecting Data
Creating and Managing Strong Passwords
Data Backup Basics
Protecting and Encrypting Devices
Rethinking Security
Digital Security: Motivations, Resistances and Barriers
Safer Browsing
Safer Browsing - Anonymity and Circumvention
Safer Browsing - HTTPS and SSL
Safer Browsing - Identity Protection and Privacy
Safer Communication
Safer Communication: PGP/GPG Email Encryption
Safer Online Advocacy
Safer Workspaces
Safer Workspaces - Using Tails
Social Media Safety
Social Media Safety Awareness
After an Event
How Are We Evaluating our Trainings?
Community
Level Up Code of Conduct
Community Resources and Tools
Contributing to LevelUp
Getting Started with LevelUp
Partners and Collaborators
About LevelUp
News & Updates
Creative Commons License
Site Map