Fall 2025
NEW!
Hotline Academy Agenda
sESSION sCHEDULE
OCT 7, 2025
OCT 14, 2025
Oct 7, 2025 - Intro TFA
sep 23, 2025
OCT 28, 2025
Oct 14, 2025 - TFA- IBSA
Steps to Complete:
Steps to Complete:
Steps to Complete:
Steps to Complete:
Training Tidbit: Genesys UI Update
Tech Facilitated Abuse: IBSA
Training Tidbit: 360 Engagement
Start Here! Welcome to your Online Class (3 Steps)
Oct 21, 2025 - NO SESSION
Tech Facilitated Abuse: Sextortion
Tech Facilitated Abuse: Introduction
Oct 28, 2025 - TFA - Sextortion
Step View
Step View
Step View
Step View
Nov 4, 2025 - TFA Safety Plan
Nov 11, 2025 - Harm Reduction 1
NOV 4, 2025
NOV 11, 2025
NOV 18, 2025
dec 2, 2025
Nov 18, 2025 - Harm Reduction 2
Steps to Complete:
Steps to Complete:
Steps to Complete:
Steps to Complete:
Risk & Harm Reduction: Risk Prioritization in DV Advocacy
Harm Reduction in High Risk Scenarios
Harm Reduction Principles in DV Advocacy
TFA: Safety Planning Part 1 - IBSA & Sextortion
Nov 25, 2025 - NO SESSION
Dec 2, 2025 - Harm Reduction 3
Step View
Step View
Step View
Step View
Risk and Harm Reduction: Risk Prioritization in DV Advocacy
This microlearning covers how to prioritize risk in domestic violence advocacy using a harm reduction approach. You'll learn how to tell the difference between needs and risks and center survivor priorities.
Training Tidbit: Genesys UI Updates (Launch Oct 30)
In this training we'll walk you through the NEW Genesys layout! While the functionality is the same, Genesys has updated their user interface (i.g. the look and feel).
TFA: Safety Planning Part One: IBSA & Sextortion
This course will review different safety planning strategies that you can share with victims of technology-facilitated abuse, as well as resources that you can share with your contacts. In this course, you will: Review the primary risks that victims of technology-facilitated abuse experience Talk about different safety planning strategies that you can share with victims, specifically around Image-Based Sexual Abuse (IBSA), Sextortion, Intimate Partner Surveillance (IPS), and Internet of Things (IoT) Abuse Learn the different resources that are available to survivors of technology-facilitated abuse
Subpath: Start Here! Week 1: Getting Started in Your Online Classroom
Welcome to your online classroom!This introductory course will take you through some of the highlights of the online classroom that you will be using, and give you an overview of the pilot program you're participating in.
Ready, Set, Go 360! In this brief course, you will see some additional features of the new online classroom hosted by 360Learning. This includes: Accessing learning content, Viewing learner results
Learners, Brows Your Platform! This course will introduce you to 360Learning. You will learn the following: 360 Learner's Guide, How to set up your personal profile
Technology Facilitated Abuse: Introduction
Take a tour of how technology and abuse have evolved in the modern age. This course goes through how significant changes in technology since The Hotline was founded in 1996 have changed DV experiences and responses, as well as current definitions of technology-facilitated abuse and basic terms to know when talking about technology-facilitated abuse.
Technology Facilitated Abuse: Introduction
This course will introduce you to the basics of image-based sexual abuse and how it is used against victims. In this course, you will: Define Image-Based Sexual Abuse (IBSA) Understand different terminology associated with IBSA Review different scenarios where IBSA is involved
Technology Facilitated Abuse: Sextortion
This course will introduce you to the basics of sextortion and how it is used against victims. In this course, you will: Define sextortion and understand the connections between sextortion and image-based sexual abuse Understand different types of sextortion and common sextortion schemes Review different scenarios involving sextortion and various sextortion tactics
Harm Reduction Principles in DV Advocacy
By the end of this module, advocates will be able to: Define harm reduction in the context of domestic violence and substance use Identify the six core harm reduction principles Recognize how harm reduction shows up in survivor-centered advocacy Apply harm reduction strategies without centering advocate judgment
Training Tidbit: Engagement on 360
Let's review how to engage with comments and hide comment view!
Harm Reduction in High Risk Scenarios
By the end of this module, advocates will be able to: Describe harm reduction in the context of high-risk DV situations Recognize the risks associated with substance use, self-harm, and being unsheltered Apply harm reduction strategies that prioritize survivor autonomy and realistic safety planning Identify community-based resources to reduce risk in the absence of ideal options
Fall 2025
Training Team
Created on October 6, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Akihabara Agenda
View
Akihabara Content Repository
View
Internal Guidelines for Artificial Intelligence Use
View
Correct Concepts
View
Sorting Cards
View
Interactive Scoreboard
View
Semicircle Mind Map
Explore all templates
Transcript
Fall 2025
NEW!
Hotline Academy Agenda
sESSION sCHEDULE
OCT 7, 2025
OCT 14, 2025
Oct 7, 2025 - Intro TFA
sep 23, 2025
OCT 28, 2025
Oct 14, 2025 - TFA- IBSA
Steps to Complete:
Steps to Complete:
Steps to Complete:
Steps to Complete:
Training Tidbit: Genesys UI Update
Tech Facilitated Abuse: IBSA
Training Tidbit: 360 Engagement
Start Here! Welcome to your Online Class (3 Steps)
Oct 21, 2025 - NO SESSION
Tech Facilitated Abuse: Sextortion
Tech Facilitated Abuse: Introduction
Oct 28, 2025 - TFA - Sextortion
Step View
Step View
Step View
Step View
Nov 4, 2025 - TFA Safety Plan
Nov 11, 2025 - Harm Reduction 1
NOV 4, 2025
NOV 11, 2025
NOV 18, 2025
dec 2, 2025
Nov 18, 2025 - Harm Reduction 2
Steps to Complete:
Steps to Complete:
Steps to Complete:
Steps to Complete:
Risk & Harm Reduction: Risk Prioritization in DV Advocacy
Harm Reduction in High Risk Scenarios
Harm Reduction Principles in DV Advocacy
TFA: Safety Planning Part 1 - IBSA & Sextortion
Nov 25, 2025 - NO SESSION
Dec 2, 2025 - Harm Reduction 3
Step View
Step View
Step View
Step View
Risk and Harm Reduction: Risk Prioritization in DV Advocacy
This microlearning covers how to prioritize risk in domestic violence advocacy using a harm reduction approach. You'll learn how to tell the difference between needs and risks and center survivor priorities.
Training Tidbit: Genesys UI Updates (Launch Oct 30)
In this training we'll walk you through the NEW Genesys layout! While the functionality is the same, Genesys has updated their user interface (i.g. the look and feel).
TFA: Safety Planning Part One: IBSA & Sextortion
This course will review different safety planning strategies that you can share with victims of technology-facilitated abuse, as well as resources that you can share with your contacts. In this course, you will: Review the primary risks that victims of technology-facilitated abuse experience Talk about different safety planning strategies that you can share with victims, specifically around Image-Based Sexual Abuse (IBSA), Sextortion, Intimate Partner Surveillance (IPS), and Internet of Things (IoT) Abuse Learn the different resources that are available to survivors of technology-facilitated abuse
Subpath: Start Here! Week 1: Getting Started in Your Online Classroom
Welcome to your online classroom!This introductory course will take you through some of the highlights of the online classroom that you will be using, and give you an overview of the pilot program you're participating in.
Ready, Set, Go 360! In this brief course, you will see some additional features of the new online classroom hosted by 360Learning. This includes: Accessing learning content, Viewing learner results
Learners, Brows Your Platform! This course will introduce you to 360Learning. You will learn the following: 360 Learner's Guide, How to set up your personal profile
Technology Facilitated Abuse: Introduction
Take a tour of how technology and abuse have evolved in the modern age. This course goes through how significant changes in technology since The Hotline was founded in 1996 have changed DV experiences and responses, as well as current definitions of technology-facilitated abuse and basic terms to know when talking about technology-facilitated abuse.
Technology Facilitated Abuse: Introduction
This course will introduce you to the basics of image-based sexual abuse and how it is used against victims. In this course, you will: Define Image-Based Sexual Abuse (IBSA) Understand different terminology associated with IBSA Review different scenarios where IBSA is involved
Technology Facilitated Abuse: Sextortion
This course will introduce you to the basics of sextortion and how it is used against victims. In this course, you will: Define sextortion and understand the connections between sextortion and image-based sexual abuse Understand different types of sextortion and common sextortion schemes Review different scenarios involving sextortion and various sextortion tactics
Harm Reduction Principles in DV Advocacy
By the end of this module, advocates will be able to: Define harm reduction in the context of domestic violence and substance use Identify the six core harm reduction principles Recognize how harm reduction shows up in survivor-centered advocacy Apply harm reduction strategies without centering advocate judgment
Training Tidbit: Engagement on 360
Let's review how to engage with comments and hide comment view!
Harm Reduction in High Risk Scenarios
By the end of this module, advocates will be able to: Describe harm reduction in the context of high-risk DV situations Recognize the risks associated with substance use, self-harm, and being unsheltered Apply harm reduction strategies that prioritize survivor autonomy and realistic safety planning Identify community-based resources to reduce risk in the absence of ideal options