Investigative reporting
- Planning for an investigative story
- Ethics of investigative journalism
- Using cross-examination to improve investigative reporting; activity 1
- Using cross-examination to improve investigative reporting; activity 2
- Using cross-examination to improve investigative reporting; scenario
- Using cross-examination to improve investigative reporting; scenario 4
- Advance Google search
Digital security
- Understanding encryption and PGP mail as a digital security measure
- Using PGP to encrypt and decrypt mail
- How to use PGP to encrypt email and files
- Encrypted communication
- Setting up PGP
- Encrypting files using PGP on webmail and other desktop apps
- Password management
- Two-factor authentication: stronger security for your online accounts
- Safety precautions when using the internet
- Hiding your IP address
- Installing VeraCrypt for different Operating Systems; Windows
- Installing VeraCrypt for different Operating Systems; Mac
- Protecting your device from malware and unauthorised access
- Creating a hidden volume in VeraCrypt
- Creating a Standard Volume on Veracrypt
- Mounting a volume
- Incident response