Terms of Reference (ToR) for Digital Security Training:

jobs-near-me.org

1. Introduction

Peace Track Initiative was founded in 2015 to support the peace process in Yemen. (PTI) is dedicated to promoting sustainable peace through inclusive dialogue, strategic communication, and grassroots engagement. As part of our ongoing efforts to enhance our impact, protecting our initiative’s and partners’ data and online communication is crucial to reach our goals. We are planning to hire a consultant to improve and develop cybersecurity skills within the organization and partners. This document outlines the Terms of Reference for a comprehensive Digital Security Course that specifically aims to enhance digital safety skills with in-depth knowledge and practical skills to protect digital assets and mitigate cyber threats within the team and partners..

2. Course Objectives:

  • To provide comprehensive knowledge on digital safety and security.
  • To equip participants with practical skills to protect their digital assets.
  • To raise awareness about common digital threats and how to mitigate them.
  • To ensure participants understand the importance of digital safety in both personal and professional contexts.

3. Target Audience

  • Team members across all levels within the organization.
  • Staff members responsible for protection cases engagement.
  • Our partners.

4. Course Structure and Content

Module 1: Understanding and Evaluating Digital risks

  • Overview of digital security concepts and importance.
  • Understanding and evaluating the digital threat landscape.
  • Key terms and definitions in digital security.
  • Thinking about individual risk when carrying out online research.
  • How information moves around the internet.
  • Who is collecting online data and how it can be used against the media.
  • The different ways that people can obtain a victim’s online data.
  • Best practice for carrying out safer online research.
  • VPNs.

Module 2: Account Security

  • Best practice for managing content in accounts
  • How to create secure passwords and where to store them
  • What two-factor authentication (2FA) and multi-factor authentication (MFA) is and how to use it
  • Guidance for better protecting against phishing
  • Tools and techniques for secure password storage.

Module 3: Device Security

  • Thinking about individual risk when it comes to protecting devices
  • Best practice for securing devices
  • Protecting against malware
  • Understanding how mobile phone operators and mobile phones work
  • Guidance on spyware

Module 4: Protecting materials

  • Thinking about individual risk when it comes to securing materials
  • Principles of data protection and privacy.
  • Best practice for backing up and storing data
  • The basics of encryption
  • Encrypting documents, USBs, HD cards, and external hard drives

Module 5: Safer Communications

  • Making informed decisions around how to contact others and how
  • Guidance on choosing the correct service for communicating with sources
  • How to better secure messaging services
  • Best communications phone applications and how to erase any traces.

5. Methodology

  • Interactive lectures and presentations.
  • Group discussions and team-building exercises.
  • Role-playing and simulation activities.
  • Case studies and real-life scenarios.
  • Practice sessions with feedback.

6. Duration and Schedule

  • The course will be delivered over 7 days.
  • Each module will be covered in one day with a mix of theoretical and practical sessions, the session should not be more than 2 hours and a half.

7. Key Activities:

  • Develop and deliver a course curriculum and reading materials.
  • Conduct interactive sessions and practical exercises.
  • Access to online resources and tools.
  • Provide resources and materials; presentation slides, and handouts for further learning..
  • Final Narrative Report.
  • Evaluation and feedback forms.

8. Diversity and Inclusion

  • Ensure the course content includes training on cultural, sensitivity, and inclusive communication practices.
  • Address the importance of diversity ( political, geographical … etc.) in communication and how to effectively communicate in diverse teams.

9. Evaluation and Certification

  • Participants will be evaluated through practical exercises and assessments.
  • Feedback will be provided throughout the course.

10. Facilitators

  • Experienced trainers with expertise in digital safety.

11. Logistics and Administration

  • Venue: online via zoom
  • Materials: To be provided by the course organizers.

How to apply

12. Contact Information

Please send your CV, cover letter and your technical and financial offer to:

ptihr@peacetrackinitiative.org, titled (Terms of Reference (ToR) for Digital Security Training)

To help us track our recruitment effort, please indicate in your email/cover letter where (jobs-near-me.org) you saw this job posting.

Share

FSO Consulting – Actuarial Life – Senior Manager – Cayman Islands

jobs-near-me.org At EY, you’ll have the chance to build a career as unique as you…

3 minutes ago

Non-Staff Consultant

jobs-near-me.org OVERVIEW Parent Sector : Education Sector (ED) Duty Station: Windhoek Job Family: Education Type of contract : Non Staff Duration…

3 minutes ago

Associate Consultant/Consultant, CES

jobs-near-me.org Job Overview Provides high quality, on-time input to client projects in the life sciences…

3 minutes ago

Production Engineering Consultancy Manager

jobs-near-me.org OVERVIEW Weatherford is a leading global energy services company. Our world-class experts partner with…

3 minutes ago

US Business Transformation, TD&E Oil & Gas Sector-Manager-Consulting

jobs-near-me.org At EY, you’ll have the chance to build a career as unique as you…

3 minutes ago

Field-based Consultant in Vitebsk – Field monitoring and reporting on programme implementation in the Vitebsk region (National, Belarus) – Req#577675

jobs-near-me.org The purpose of this consultancy is to provide field monitoring on status of children…

3 minutes ago
For Apply Button. Please use Non-Amp Version

This website uses cookies.