You should research current digital security best practices based on your individual threat model. But for posterity (and insight into organizing training sessions), check out our materials from our Digital Security Training with ACLU DC and Georgetown Law’s Institute for Technology Law & Policy in August 2017.
See also Georgetown Law’s Institute for Technology Law