Understanding + Improving Cybersecurity for Nonprofits | George Weiner | Skillshare

Understanding + Improving Cybersecurity for Nonprofits

George Weiner, Whole Whale University

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
29 Videos (2h 39m)
    • Intro: Who are we and what is this about

      10:58
    • Part 1 Module 1: Threat Modeling

      5:01
    • Part 1 Module 2: Risk Assessment

      4:42
    • Part 1 Module 3: Thinking about Risk

      12:48
    • Part 1 Module 4: CIA Framework

      4:24
    • Part 1 Module 5: Layers of Defense

      4:19
    • Part 2 Module 1: Understanding network devices

      3:59
    • Part 2 Module 2: Securing your network

      6:00
    • Part 2 Module 3: Securing your endpoints

      3:12
    • Part 2 Module 4: Testing your network

      2:51
    • Part 2 Module 5: BeyondCorp

      4:02
    • Part 3 Module 1: People are the weakest link

      2:28
    • Part 3 Module 2: Live to Serve

      5:01
    • Part 3 Module 3: Getting P0wned

      5:57
    • Part 3 Module 4: Here phishy phishy

      5:57
    • Part 4 Module 1: Your passwords are terrible

      5:53
    • Part 4 Module 2: More than just something you know

      6:08
    • Part 4 Module 3: On the Move

      9:47
    • Part 4 Module 4: A little privacy please

      6:40
    • Part 5 Module 1: PCI-DSS

      4:48
    • Part 5 Module 2: HIPAA

      4:07
    • Part 5 Module 3: GDPR

      4:44
    • Part 6 Module 1: Key components of incident response planning

      2:58
    • Part 6 Module 2: Detecting

      5:12
    • Part 6 Module 3: Declaring

      4:49
    • Part 6 Module 4: Containing

      4:12
    • Part 6 Module 5: Communicating

      4:00
    • Part 6 Module 6: Learning

      1:54
    • Outro: Some tools & templates for your next steps

      11:51

About This Class

Challenge

Cybersecurity is a constant challenge for all organizations. Heck, just keeping up with the pace of technological change is a herculean task all by itself. People and organizations are faced with a virtual blizzard of new technology every day and, in trying to improve our organizations, we have to evaluate and adopt new technologies all the time. We must also think about how these changing technologies impact the security of our organization, our information, our clients, constituents and staff.

Approach

This course will help students build a solid foundation for those looking to significantly improve their literacy around digital security. The sessions will focus on both strategy and tactics, helping students learn foundational security skills that will apply for years to come, while also delving into the specific tactics and tools that are most relevant today. Whether you are just starting on your cybersecurity career, looking to help make your organization more secure, or looking to develop literacy and skills around cybersecurity, this course is for you.


What are the requirements?

  • Basic working knowledge of computers, networks and the Internet
  • A desire to improve both personal and organizational cybersecurity
  • A spirit of adventure

What am I going to get from this course?

  • Understand the core principles of cybersecurity
  • Learn how social engineering (including phishing) work
  • Know the threetwo (32) key things you can do to immediately improve cybersecurity at your organization
  • A basic primer in GDPR (General Data Protection Regulation)
  • How to perform a high level cybersecurity risk assessment

Who is the target audience?

  • IT professionals looking to develop cybersecurity skills
  • Nonprofit “Accidental Techies” looking to add “accidental cybersecurity ninja” to their skillset
  • Anyone interested in understanding and applying key cybersecurity principles

Meet your instructor: Joshua Peskay

Joshua Peskay is the Vice President of Technology Strategy at RoundTable Technology and an accomplished technology leader with more than two decades of experience managing technology for over a thousand New York City nonprofit organizations. Joshua is committed to helping organizations sort through the rapid pace of technological change to select the best products and services available and use them effectively. Joshua is a dynamic and engaging public speaker with a proven track-record for ​planning, implementing and supporting a wide range of successful technology solutions for nonprofits.

Joshua is also a nationally recognized expert in nonprofit cybersecurity and performs dozens of cybersecurity assessments a year for various organizations, with a focus on those organizations in the civil rights and immigration rights sector. Joshua works to help organizations overcome FUD (Fear, Uncertainty and Doubt) to gain a thorough understanding of the risks they face and actionable and achievable steps they can take to manage those risks.

17

Students

--

Projects

  • --
  • Beginner
  • Intermediate
  • Advanced
  • All Levels
  • Beg/Int
  • Int/Adv

Level

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.

George Weiner

Whole Whale University

Whole Whale is a digital agency that leverages data and technology to increase the impact of nonprofits. In the same way the Inuits used every part of whale, WW leverages data and tech to increase organizational impact and reduce waste. By using data analysis, digital strategy, web development, and training, WW builds a Data Culture within every nonprofit they work with.

Instructors:

George Weiner, Founder and CEO of Whole Whale

George is the Founder and CEO of Whole Whal...

See full profile

Report class