{"id":3177,"date":"2018-05-26T21:16:08","date_gmt":"2018-05-26T18:16:08","guid":{"rendered":"https:\/\/ldn.org.ua\/?post_type=person&#038;p=3177"},"modified":"2018-05-26T21:16:08","modified_gmt":"2018-05-26T18:16:08","slug":"taras-nosalskyi","status":"publish","type":"person","link":"https:\/\/ldn.org.ua\/en\/person\/taras-nosalskyi\/","title":{"rendered":"Taras Nosalskyi"},"content":{"rendered":"<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\"><span title=\"\u0417 2002 \u0440\u043e\u043a\u0443 \u0437\u0430\u0439\u043c\u0430\u0454\u0442\u044c\u0441\u044f \u043e\u0441\u0432\u0456\u0442\u043e\u044e \u0432 \u0441\u0444\u0435\u0440\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439.\">Since 2002 he has been studying information technologies. <\/span><span title=\"\u0412 2014 \u0440\u043e\u0446\u0456 \u043f\u0456\u0441\u043b\u044f \u0420\u0435\u0432\u043e\u043b\u044e\u0446\u0456\u0457 \u0413\u0456\u0434\u043d\u043e\u0441\u0442\u0456 \u0434\u043e\u043b\u0443\u0447\u0438\u0432\u0441\u044f \u0434\u043e \u0433\u0440\u043e\u043c\u0430\u0434\u0441\u044c\u043a\u043e\u0457 \u0434\u0456\u044f\u043b\u044c\u043d\u043e\u0441\u0442\u0456 \u0441\u0442\u0430\u0432\u0448\u0438 \u0447\u043b\u0435\u043d\u043e\u043c \u0425\u043c\u0456\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u043e\u0457 \u0440\u0430\u0439\u043e\u043d\u043d\u043e\u0457 \u0433\u0440\u043e\u043c\u0430\u0434\u0441\u044c\u043a\u043e\u0457 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0457 &quot;\u041f\u0420\u0410\u0412\u041e&quot;.\n\n\">In 2014, after the Revolution of Goodwill, he became a member of the Khmelnytsky regional NGO &#8220;RIGHT&#8221; in public activity.<\/p>\n<p><\/span><span title=\"\u0422\u0435\u043c\u0430\u0442\u0438\u043a\u0430 \u0442\u0440\u0435\u043d\u0456\u043d\u0433\u0456\u0432:\n\">Training topics:<br \/>\n<\/span><span title=\"- \u041f\u0440\u0430\u0432\u0430 \u043b\u044e\u0434\u0438\u043d\u0438.\">&#8211; Human Rights. <\/span><span title=\"\u0420\u043e\u0431\u0438\u043c\u043e \u043f\u0435\u0440\u0448\u0456 \u043a\u0440\u043e\u043a\u0438;\n\">We take the first steps;<br \/>\n<\/span><span title=\"- \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 (\u0437\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u0432\u0456\u0440\u0443\u0441\u0456\u0432 \u0442\u0430 \u0456\u043d\u0448\u0438\u0445 \u043a\u043e\u043c'\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0437\u0430\u0433\u0440\u043e\u0437, \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u0435 \u043a\u043e\u043f\u0456\u044e\u0432\u0430\u043d\u043d\u044f \u0434\u0430\u043d\u0438\u0445, \u0432\u0456\u0434\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0432\u0442\u0440\u0430\u0447\u0435\u043d\u0438\u0445 \u0444\u0430\u0439\u043b\u0456\u0432, \u0442\u043e\u0449\u043e);\n\">&#8211; Information security (protection against viruses and other computer threats, backup data, recover lost files, etc.);<br \/>\n<\/span><span title=\"- \u0415\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0430 \u0440\u043e\u0431\u043e\u0442\u0430 \u0437 \u043a\u043e\u043c\u043f'\u044e\u0442\u0435\u0440\u043e\u043c\/\u043d\u043e\u0442\u0431\u0443\u043a\u043e\u043c\/\u043f\u043b\u0430\u043d\u0448\u0435\u0442\u043e\u043c\/\u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u043e\u043c (\u0441\u043b\u0456\u043f\u0438\u0439 \u0434\u0435\u0441\u044f\u0442\u0438\u043f\u0430\u043b\u044c\u0446\u0435\u0432\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u043d\u0430\u0431\u043e\u0440\u0443 \u0442\u0435\u043a\u0441\u0442\u0443 \u043d\u0430 \u043a\u043b\u0430\u0432\u0456\u0430\u0442\u0443\u0440\u0456, \u043e\u0444\u0456\u0441\u043d\u0456 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0438, \u0441\u043a\u0430\u043d\u0443\u0432\u0430\u043d\u043d\u044f, \u0434\u0440\u0443\u043a, \u0435\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0430 \u043f\u043e\u0448\u0442\u0430, \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u0430 \u0440\u043e\u0431\u043e\u0442\u0430 \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u043c\u0435\u0440\u0435\u0436\u0456 \u0406\u043d\u0442\u0435\u0440\u043d\u0435\u0442, \u0441\u0443\u0447\u0430\u0441\u043d\u0456 \u0431\u0435\u0437\u043f\u0435\u0447\u043d\u0456 \u0437\u0430\u0441\u043e\u0431\u0438 \u0437\u0432'\u044f\u0437\u043a\u0443, \u0442\u043e\u0449\u043e);\n\">&#8211; Effective work with a computer \/ notebook \/ tablet \/ smartphone (blind ten-finger typing method on the keyboard, office software, scanning, printing, e-mail, teamwork via the Internet, modern secure communication tools, etc.);<br \/>\n<\/span><span title=\"- \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0430\u0442\u0430\u043a (\u0436\u0438\u0442\u0442\u044f \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0432\u0456\u0439\u043d\u0438);\n\">&#8211; Protection against information attacks (life in the context of information warfare);<br \/>\n<\/span><span title=\"- \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0433\u0456\u0433\u0456\u0454\u043d\u0430 (\u044f\u043a \u0432\u0456\u0434\u0440\u0456\u0437\u043d\u0438\u0442\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0439 \u0431\u0440\u0443\u0434 \u0432\u0456\u0434 \u0441\u043f\u0440\u0430\u0432\u0436\u043d\u044c\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457).\n\n\">&#8211; Information hygiene (how to distinguish informational dirt from genuine information).<\/p>\n<p><\/span><span title=\"\u0412\u0441\u0456 \u0442\u0440\u0435\u043d\u0456\u043d\u0433\u0438 \u043c\u043e\u0436\u0443\u0442\u044c \u0431\u0443\u0442\u0438 \u0430\u0434\u0430\u043f\u0442\u043e\u0432\u0430\u043d\u0456 \u0434\u043e \u0431\u0443\u0434\u044c-\u044f\u043a\u043e\u0457 \u0432\u0456\u043a\u043e\u0432\u043e\u0457 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0456\u0457 \u043f\u043e\u0447\u0438\u043d\u0430\u044e\u0447\u0438 \u0437 12 \u0440\u043e\u043a\u0456\u0432.\">All trainings can be adapted to any age group from 12 years old.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since 2002 he has been studying information technologies. In 2014, after the Revolution of Goodwill, he became a member of the Khmelnytsky regional NGO &#8220;RIGHT&#8221; in public activity. Training topics: &#8211; Human Rights. We take the first steps; &#8211; Information&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"template":"","person-role":[],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ldn.org.ua\/en\/wp-json\/wp\/v2\/person\/3177"}],"collection":[{"href":"https:\/\/ldn.org.ua\/en\/wp-json\/wp\/v2\/person"}],"about":[{"href":"https:\/\/ldn.org.ua\/en\/wp-json\/wp\/v2\/types\/person"}],"author":[{"embeddable":true,"href":"https:\/\/ldn.org.ua\/en\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":1,"href":"https:\/\/ldn.org.ua\/en\/wp-json\/wp\/v2\/person\/3177\/revisions"}],"predecessor-version":[{"id":3178,"href":"https:\/\/ldn.org.ua\/en\/wp-json\/wp\/v2\/person\/3177\/revisions\/3178"}],"wp:attachment":[{"href":"https:\/\/ldn.org.ua\/en\/wp-json\/wp\/v2\/media?parent=3177"}],"wp:term":[{"taxonomy":"person-role","embeddable":true,"href":"https:\/\/ldn.org.ua\/en\/wp-json\/wp\/v2\/person-role?post=3177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}