Want to create interactive content? It’s easy in Genially!

Get started free

Fall 2025

Training Team

Created on October 6, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Akihabara Agenda

Akihabara Content Repository

Internal Guidelines for Artificial Intelligence Use

Correct Concepts

Sorting Cards

Interactive Scoreboard

Semicircle Mind Map

Transcript

Fall 2025

NEW!

Hotline Academy Agenda

sESSION sCHEDULE

OCT 7, 2025

OCT 14, 2025

Oct 7, 2025 - Intro TFA

sep 23, 2025

OCT 28, 2025

Oct 14, 2025 - TFA- IBSA

Steps to Complete:

Steps to Complete:

Steps to Complete:

Steps to Complete:

Training Tidbit: Genesys UI Update

Tech Facilitated Abuse: IBSA

Training Tidbit: 360 Engagement

Start Here! Welcome to your Online Class (3 Steps)

Oct 21, 2025 - NO SESSION

Tech Facilitated Abuse: Sextortion

Tech Facilitated Abuse: Introduction

Oct 28, 2025 - TFA - Sextortion

Step View
Step View
Step View
Step View

Nov 4, 2025 - TFA Safety Plan

Nov 11, 2025 - Harm Reduction 1

NOV 4, 2025

NOV 11, 2025

NOV 18, 2025

dec 2, 2025

Nov 18, 2025 - Harm Reduction 2

Steps to Complete:

Steps to Complete:

Steps to Complete:

Steps to Complete:

Risk & Harm Reduction: Risk Prioritization in DV Advocacy

Harm Reduction in High Risk Scenarios

Harm Reduction Principles in DV Advocacy

TFA: Safety Planning Part 1 - IBSA & Sextortion

Nov 25, 2025 - NO SESSION

Dec 2, 2025 - Harm Reduction 3

Step View
Step View
Step View
Step View

Risk and Harm Reduction: Risk Prioritization in DV Advocacy

This microlearning covers how to prioritize risk in domestic violence advocacy using a harm reduction approach. You'll learn how to tell the difference between needs and risks and center survivor priorities.

Training Tidbit: Genesys UI Updates (Launch Oct 30)

In this training we'll walk you through the NEW Genesys layout! While the functionality is the same, Genesys has updated their user interface (i.g. the look and feel).

TFA: Safety Planning Part One: IBSA & Sextortion

This course will review different safety planning strategies that you can share with victims of technology-facilitated abuse, as well as resources that you can share with your contacts. In this course, you will: Review the primary risks that victims of technology-facilitated abuse experience Talk about different safety planning strategies that you can share with victims, specifically around Image-Based Sexual Abuse (IBSA), Sextortion, Intimate Partner Surveillance (IPS), and Internet of Things (IoT) Abuse Learn the different resources that are available to survivors of technology-facilitated abuse

Subpath: Start Here! Week 1: Getting Started in Your Online Classroom

Welcome to your online classroom!This introductory course will take you through some of the highlights of the online classroom that you will be using, and give you an overview of the pilot program you're participating in.

Ready, Set, Go 360! In this brief course, you will see some additional features of the new online classroom hosted by 360Learning. This includes: Accessing learning content, Viewing learner results

Learners, Brows Your Platform! This course will introduce you to 360Learning. You will learn the following: 360 Learner's Guide, How to set up your personal profile

Technology Facilitated Abuse: Introduction

Take a tour of how technology and abuse have evolved in the modern age. This course goes through how significant changes in technology since The Hotline was founded in 1996 have changed DV experiences and responses, as well as current definitions of technology-facilitated abuse and basic terms to know when talking about technology-facilitated abuse.

Technology Facilitated Abuse: Introduction

This course will introduce you to the basics of image-based sexual abuse and how it is used against victims. In this course, you will: Define Image-Based Sexual Abuse (IBSA) Understand different terminology associated with IBSA Review different scenarios where IBSA is involved

Technology Facilitated Abuse: Sextortion

This course will introduce you to the basics of sextortion and how it is used against victims. In this course, you will: Define sextortion and understand the connections between sextortion and image-based sexual abuse Understand different types of sextortion and common sextortion schemes Review different scenarios involving sextortion and various sextortion tactics

Harm Reduction Principles in DV Advocacy

By the end of this module, advocates will be able to: Define harm reduction in the context of domestic violence and substance use Identify the six core harm reduction principles Recognize how harm reduction shows up in survivor-centered advocacy Apply harm reduction strategies without centering advocate judgment

Training Tidbit: Engagement on 360

Let's review how to engage with comments and hide comment view!

Harm Reduction in High Risk Scenarios

By the end of this module, advocates will be able to: Describe harm reduction in the context of high-risk DV situations Recognize the risks associated with substance use, self-harm, and being unsheltered Apply harm reduction strategies that prioritize survivor autonomy and realistic safety planning Identify community-based resources to reduce risk in the absence of ideal options