Difference between revisions of "Main Page/Crash Courses/Systems and Policies"
Jump to navigation
Jump to search
Line 16: | Line 16: | ||
|| Week || Dates || Real time lecture || Topic || Lecturer | || Week || Dates || Real time lecture || Topic || Lecturer | ||
|- | |- | ||
− | || 1 || Week of May 16th|| May 20th, 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Introduction to this course and | + | || 1 || Week of May 16th|| May 20th, 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Introduction to this course and each other || Alison |
|- | |- | ||
|| 2 || Week of May 23rd || May 27th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Threat modeling and privacy basics|| Alison | || 2 || Week of May 23rd || May 27th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Threat modeling and privacy basics|| Alison | ||
|- | |- | ||
− | || 3 || Week of May 30th|| June 3rd 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || | + | || 3 || Week of May 30th|| June 3rd 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Privacy policies and some best practices |
|| Alison | || Alison | ||
|- | |- | ||
− | || 4 || Week of June 6th || June 10th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Vendors | + | || 4 || Week of June 6th || June 10th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Vendors |
|| | || | ||
|- | |- | ||
− | || 5 || Week of June 13th || June 17th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Working with IT | + | || 5 || Week of June 13th || June 17th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Working with IT and other stakeholders, some cybersecurity basics |
− | |||
|| | || | ||
|- | |- | ||
− | || 6 || Week of June 20th || June 24th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Public computer environments | + | || 6 || Week of June 20th || June 24th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Public computer environments |
|| | || | ||
|- | |- | ||
− | || 7 || Week of June 27th || July 1st 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Privacy audits | + | || 7 || Week of June 27th || July 1st 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Privacy audits, and making privacy work into a sustainable ongoing practice || Alison |
|- | |- | ||
− | || 8 || Week of July 4th || July 8th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || | + | || 8 || Week of July 4th || July 8th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern || Closing talk and presentations || |
|- | |- | ||
Line 41: | Line 40: | ||
===== Weekly curriculum ===== | ===== Weekly curriculum ===== | ||
− | ====== [https://libraryfreedom.wiki/html/public_html/index.php?title=Main_Page/Crash_Courses/Systems_and_Policies/Week_one Week 1: Introduction to this course and | + | ====== [https://libraryfreedom.wiki/html/public_html/index.php?title=Main_Page/Crash_Courses/Systems_and_Policies/Week_one Week 1: Introduction to this course and each other ] ====== |
====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_two Week 2: Threat modeling and privacy basics] ====== | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_two Week 2: Threat modeling and privacy basics] ====== | ||
− | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_three Week 3: | + | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_three Week 3: Privacy policies and some best practices] ====== |
− | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_four Week 4: Vendors | + | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_four Week 4: Vendors] ====== |
− | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_five Week 5:Working with IT | + | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_five Week 5: Working with IT and other stakeholders, some cybersecurity basics] ====== |
− | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_six: Week 6: Public computer environments | + | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_six: Week 6: Public computer environments] ====== |
− | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_seven Week 7: Privacy audits | + | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_seven Week 7: Privacy audits, and making privacy work into a sustainable ongoing practice] ====== |
====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_eight Week 8: Closing talk and presentations] ====== | ====== [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Crash_Courses/Systems_and_Policies/Week_eight Week 8: Closing talk and presentations] ====== |
Revision as of 15:52, 20 April 2021
Contents
- 1 LFP Crash Course: Systems and Policies
- 1.1 General course information and resources
- 1.2 Schedule and curriculum
- 1.2.1 Schedule overview
- 1.2.2 Weekly curriculum
- 1.2.2.1 Week 1: Introduction to this course and each other
- 1.2.2.2 Week 2: Threat modeling and privacy basics
- 1.2.2.3 Week 3: Privacy policies and some best practices
- 1.2.2.4 Week 4: Vendors
- 1.2.2.5 Week 5: Working with IT and other stakeholders, some cybersecurity basics
- 1.2.2.6 Week 6: Public computer environments
- 1.2.2.7 Week 7: Privacy audits, and making privacy work into a sustainable ongoing practice
- 1.2.2.8 Week 8: Closing talk and presentations
LFP Crash Course: Systems and Policies
General course information and resources
- Weekly conversation recordings get posted here.
- Code of Conduct
- Riseup mailing list: a private list that Crash Course members get subscribed to when the course begins.
- Zoom video conference room: a private Zoom room that we'll use for weekly conversations.
- LFP message board: Another conversation space for asynchronous discussion.
- Bios and photos of this cohort [TBD].
Schedule and curriculum
Schedule overview
Week | Dates | Real time lecture | Topic | Lecturer |
1 | Week of May 16th | May 20th, 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern | Introduction to this course and each other | Alison |
2 | Week of May 23rd | May 27th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern | Threat modeling and privacy basics | Alison |
3 | Week of May 30th | June 3rd 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern | Privacy policies and some best practices | Alison |
4 | Week of June 6th | June 10th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern | Vendors | |
5 | Week of June 13th | June 17th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern | Working with IT and other stakeholders, some cybersecurity basics | |
6 | Week of June 20th | June 24th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern | Public computer environments | |
7 | Week of June 27th | July 1st 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern | Privacy audits, and making privacy work into a sustainable ongoing practice | Alison |
8 | Week of July 4th | July 8th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern | Closing talk and presentations |