1. Introduction
Peace Track Initiative was founded in 2015 to support the peace process in Yemen. (PTI) is dedicated to promoting sustainable peace through inclusive dialogue, strategic communication, and grassroots engagement. As part of our ongoing efforts to enhance our impact, protecting our initiative’s and partners’ data and online communication is crucial to reach our goals. We are planning to hire a consultant to improve and develop cybersecurity skills within the organization and partners. This document outlines the Terms of Reference for a comprehensive Digital Security Course that specifically aims to enhance digital safety skills with in-depth knowledge and practical skills to protect digital assets and mitigate cyber threats within the team and partners..
2. Course Objectives:
- To provide comprehensive knowledge on digital safety and security.
- To equip participants with practical skills to protect their digital assets.
- To raise awareness about common digital threats and how to mitigate them.
- To ensure participants understand the importance of digital safety in both personal and professional contexts.
3. Target Audience
- Team members across all levels within the organization.
- Staff members responsible for protection cases engagement.
- Our partners.
4. Course Structure and Content
Module 1: Understanding and Evaluating Digital risks
- Overview of digital security concepts and importance.
- Understanding and evaluating the digital threat landscape.
- Key terms and definitions in digital security.
- Thinking about individual risk when carrying out online research.
- How information moves around the internet.
- Who is collecting online data and how it can be used against the media.
- The different ways that people can obtain a victim’s online data.
- Best practice for carrying out safer online research.
- VPNs.
Module 2: Account Security
- Best practice for managing content in accounts
- How to create secure passwords and where to store them
- What two-factor authentication (2FA) and multi-factor authentication (MFA) is and how to use it
- Guidance for better protecting against phishing
- Tools and techniques for secure password storage.
Module 3: Device Security
- Thinking about individual risk when it comes to protecting devices
- Best practice for securing devices
- Protecting against malware
- Understanding how mobile phone operators and mobile phones work
- Guidance on spyware
Module 4: Protecting materials
- Thinking about individual risk when it comes to securing materials
- Principles of data protection and privacy.
- Best practice for backing up and storing data
- The basics of encryption
- Encrypting documents, USBs, HD cards, and external hard drives
Module 5: Safer Communications
- Making informed decisions around how to contact others and how
- Guidance on choosing the correct service for communicating with sources
- How to better secure messaging services
- Best communications phone applications and how to erase any traces.
5. Methodology
- Interactive lectures and presentations.
- Group discussions and team-building exercises.
- Role-playing and simulation activities.
- Case studies and real-life scenarios.
- Practice sessions with feedback.
6. Duration and Schedule
- The course will be delivered over 7 days.
- Each module will be covered in one day with a mix of theoretical and practical sessions, the session should not be more than 2 hours and a half.
7. Key Activities:
- Develop and deliver a course curriculum and reading materials.
- Conduct interactive sessions and practical exercises.
- Access to online resources and tools.
- Provide resources and materials; presentation slides, and handouts for further learning..
- Final Narrative Report.
- Evaluation and feedback forms.
8. Diversity and Inclusion
- Ensure the course content includes training on cultural, sensitivity, and inclusive communication practices.
- Address the importance of diversity ( political, geographical … etc.) in communication and how to effectively communicate in diverse teams.
9. Evaluation and Certification
- Participants will be evaluated through practical exercises and assessments.
- Feedback will be provided throughout the course.
10. Facilitators
- Experienced trainers with expertise in digital safety.
11. Logistics and Administration
- Venue: online via zoom
- Materials: To be provided by the course organizers.
How to apply
12. Contact Information
Please send your CV, cover letter and your technical and financial offer to:
ptihr@peacetrackinitiative.org, titled (Terms of Reference (ToR) for Digital Security Training)