Incorporate tech-savvy skills into your work with victims by learning how to:
-
Explain Common Forms of Tech-Enabled Abuse
-
Identify Red Flags
-
Help Victims Understand & Identify their Digital Footprint (online accounts & apps)
-
Improve Digital Safety Through Tech Safety Planning
-
Apply Tech-Savvy Trauma Informed Care
Who Should Participate
Course curriculum
-
1
Welcome to the course!
-
A message from the instructor
-
Before we begin...
-
-
2
Introduction to Tech-Enabled Abuse
-
Technology-Enabled Abuse: What is it?
-
Who is being harmed and how bad is it?
-
Why victims of gender-based violence are high risk
-
Real World Examples
-
What did you notice?
-
Test your learning
-
Resources
-
-
3
Red Flags: Screening for Abuse
-
Getting Started
-
Reddish Flags
-
Red Flags
-
More Red Flags
-
Example: Spotting Flags
-
Test Your Learning
-
Resource: Red Flag Screening Questions
-
-
4
Tech Safety
-
Identifying the Digital Footprint
-
Getting Started
-
STEP 1: Using a Safe Device
-
STEP 2: Create a New Email?
-
STEP 3: The Password Problem (1 of 3)
-
Passwords (2 of 3)
-
Passwords (3 of 3)
-
STEP 4: 2-Factor Authentication (2FA)
-
Example: 2-Factor Authentication
-
STEP 5: "Trusted" Devices
-
Example: Identify & Remove "Trusted Devices"
-
STEP 6: Compromised Contact Info
-
Example: Addressing Compromised Contact Information
-
STEP 7: The Problem with Security Questions
-
Test Your Learning
-
Practice Lesson: Using the Guides
-
-
5
Overcoming Challenges
-
Introduction
-
Getting on the Same Page
-
Unique Challenges Pt. 1
-
Unique Challenges Pt. 2
-
Reaching Victims Pt. 1
-
Reaching Victims Pt. 2
-
Test Your Learning
-
Resources
-
-
6
Survey: How did it go?
-
Course Feedback & Improvements
-
Instructor(s)
