Skip to content

Commit

Permalink
Merge pull request #19 from zenmonkeykstop/issue15
Browse files Browse the repository at this point in the history
Added TOC to index, fixed titles for Chap 1 pages
  • Loading branch information
ryanpitts committed Jan 16, 2018
2 parents ebac153 + 5eb8497 commit 3ced0bd
Show file tree
Hide file tree
Showing 3 changed files with 30 additions and 11 deletions.
3 changes: 1 addition & 2 deletions docs/Chapter01-02-TrainingGames.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,4 @@
# Chapter 1
## Part 3: Games Worth Playing
## Games Worth Playing

Games are a helpful way to keep your audience engaged, and to gently introduce them to technical concepts. It's unrealistic, and probably not useful, to try to provide a detailed description of how the Internet works in the time you'll most likely have. Instead, the games below will give your participants an intuitive understanding of basic networking concepts and the role that encryption plays in securing their communications - and hopefully add a little fun to your training sessions!

Expand Down
7 changes: 3 additions & 4 deletions docs/Chapter01-03-OrganizationalSelfAssessment.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,4 @@
# Chapter 1
## Part 3: Organizational Self-Assessment
## Organizational Self-Assessment

These questions should help you build a better understanding of how your organization approaches security already. They also make a good starting point for a best practices list.

Expand All @@ -26,7 +25,7 @@ As a general rule, you want to work with, not against, internal IT policies. So
* Have you communicated that plan to newsroom management?
* Does that plan include post-mortem review?

### Questions for newsroom leadership:
### Questions for newsroom leadership

* Do you use collaborative document editing and storage services (eg. Google Drive, Dropbox, Trello, Evernote)?
* Do you have a policy about whether or not to store "sensitive" information in these services?
Expand All @@ -46,7 +45,7 @@ As a general rule, you want to work with, not against, internal IT policies. So
* Are there tools or techniques you’d like to use but can’t because of internal editorial policies or internal IT policies?
* Have specific incidents prompted you to seek out additional tools and/or training?

### How to use the information you’ve collected:
### How to use the information you’ve collected

* Tailor your recommendations for best practices (especially as they relate to newsroom-wide policies or changes to infrastructure). In many news organizations, you’ll find that the IT side and the newsroom side aren’t communicating with each other on these topics. This training and these conversations are a great way to help an organization get started.
* Help select lessons and training modules to use from this curriculum.
Expand Down
31 changes: 26 additions & 5 deletions docs/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,19 +2,40 @@ Did The Intercept just burn a source? Does that Yahoo hack mean that you need to

Often the person they turn to for help has to come up with smart answers on the fly. They’re the one developer who uses GPG, or the reporter who’s been trying to convince everyone else to install Signal—and now they’re suddenly pressed into service as the newsroom security expert. Or they’re the IT staffer tasked with keeping the mail servers running, only now they’re also the in-house opsec consultant who doesn’t have any formal training in what reporters and editors need.

## About This Guide
# About This Guide

This resource collects the advice and experience of journalists, newsroom developers, and security experts, organized into a set of lessons and training materials available for newsroom staff who find themselves leading security trainings. In a moment when reporters are asking how to protect themselves and their sources, we want to see a more people armed to answer those questions and help newsrooms communicate and store data more securely.

The curriculum is hosted by [OpenNews](https://opennews.org/), a team that helps developers, designers, and data analysts convene and collaborate on open journalism projects, and [BuzzFeed Open Lab](https://www.buzzfeed.com/openlab), an arts and technology fellowship program at BuzzFeed News. The first draft began during a two-day event in June 2017, with about 20 people working in-person and remote.

## Table of Contents
# Table of Contents

We’ve organized this guide into three key sections. Chapter 1 is an enormous resource for new trainers or folks who are looking for ways to be better at training, in general. We’ve written this with a newsroom audience in mind, and we’ve pooled a lot of valuable resources that already exist in the world. Chapter 2 is a fantastic collection of lesson plans and training materials to help people cover key topics with their peers. And Chapter 3 is our best effort to aggregate links to the best existing resources, to help new trainers deepen their own expertise.
We’ve organized this guide into three key sections. Chapter 2 is a fantastic collection of lesson plans and training materials to help people cover key topics with their peers. And Chapter 3 is our best effort to aggregate links to the best existing resources, to help new trainers deepen their own expertise.

*TK: Links to chapters*
## Chapter 1 - Being a better Trainer
Chapter 1 is an enormous resource for new trainers or folks who are looking for ways to be better at training, in general. We’ve written this with a newsroom audience in mind, and we’ve pooled a lot of valuable resources that already exist in the world.

## Contributing
* [Being A Better Trainer](Chapter01-01-BeingABetterTrainer)
* [Training Games](Chapter01-02-TrainingGames)
* [Organizational Self-Assessment](Chapter01-03-OrganizationalSelfAssessment)
## Chapter 2 - Lesson plans
Chapter 2 is a fantastic collection of lesson plans and training materials to help people cover key topics with their peers.

* [Mobile Security Settings](Chapter02-01-Mobile-Security-Settings)
* [Mobile Backups](Chapter02-02-Mobile-Backups)
* [Locking Down Mobile](Chapter02-03-Locking-Down-Mobile)
* [Setting Up Signal](Chapter02-04-Setting-Up-Signal)
* [Good Hygiene For Apps](Chapter02-05-Good-Hygiene-For-Apps)
* [Two-Factor Authentication](Chapter02-07-Two-Factor-Authentication)


## Chapter 3 - Resources
Chapter 3 is our best effort to aggregate links to the best existing resources, to help new trainers deepen their own expertise.

* [Resources](Chapter03-Resources)


# Contributing

This is a community resource, and it gets better every time anyone from the journalism and security communities shares advice, writes up a new lesson, asks a question, or even just spots a typo. We'd love to add your expertise to this project, and [here's how you can join in](contributing.md).

Expand Down

0 comments on commit 3ced0bd

Please sign in to comment.