
Zakaria SAWADOGO
—
Zakaria SAWADOGO
Start on your path to effectively advocate for an open, globally connected, secure, and trustworthy Internet. This learning track will take you through the foundations of the Internet way of networking and writing Internet impact briefs, the benefits of encryption, and how Internet policies are created and governed. By the end of the track you will have the knowledge you need to properly assess threats to the Internet and credibly advocate against them.
You will take five courses: What the Internet Needs to Exist, What the Internet Needs to Thrive, How to Write an Internet Impact Brief, Encryption, Internet Governance
You must complete all five courses to receive your Internet Policy and Advocacy Professional certificate.
Skills / Knowledge
- Learn what the Internet Way of Networking is and the five critical properties that make up the foundation that underpins the Internet
- Find out how to identify threats to the Internet Way of Networking, with examples from existing use cases
- Learn how conducting an Internet impact assessment can help prevent policies, technologies and trends from harming the Internet
- Learn about the Internet Impact Assessment Toolkit, and how it can help users protect the foundation that keeps the Internet working for everyone
- Time and time again, different groups and organizations worldwide with different viewpoints find common ground on a shared set of goals for the Internet. This course explores how the goals are a network that is open, globally connected, secure and trustworthy
- Describe the types of issues and policy trends where an Internet Impact Brief might be appropriate
- Understand the skills and resources needed to write an Internet Impact Brief
- Use the Internet Impact Assessment Toolkit to analyze Internet-related issues
- Structure an Internet Impact Brief to maximize its impact for your target audience
- Describe encryption concepts at a high level, and the benefits encryption offers to us individually and as a society
- Find out why it is important, and the ways in which we rely upon strong encryption in our daily lives
- Understand how and why efforts to weaken encryption pose a serious threat
- Learn about various “backdoor access” proposals and why they are problematic
- Learn about the Internet Society’s goals and activities related to supporting strong encryption and defending against threats to it
- Discover what actions you can take to advocate for strong encryption in your community and beyond
- History of the Internet
- Internet governance-Internet ecosystem
- Multistakeholder model
- Actors and stakeholders involved in Internet development and governance
- Internet infrastructure, standards, protocols, and systems
- Foundations of Internet law-Challenges in implementation and enforcement of Internet law
- Policy and technical perspectives on cybersecurity
- Types of threats
- National cybersecurity frameworks
- Role of international organizations
Issued on
January 4, 2024
Expires on
Does not expire