Please find below a list of many of the trainings that the Progressive Technology Project has conducted over the years. Each training contains links to materials used in the trainings.


Materials will not be printed for you at the training. If you want a paper copy, please download and print before you come.



Welcome & Introductions

  • Go Around & Discussion: Each share the following:
    • What database tool are you using?
    • How are you and your organization using the database?
    • What are the pros and cons of using your database?

Aspects of Database Security

  • Knowing your providers
  • Knowing your tech support
  • Know your staff and volunteers
  • Know your mission

How do these security aspects apply to the following types of Databases:



  • Opening Question - What is your biggest security fear? Please share stories of security "incidences" that you're comfortable sharing.
  • Framing "Security" (Holistic Security & Data Stewardship) and the Political Environment
  • Exercise: Prioritizing risks that are relevant to your work
  • Exercise: Report back and questions
  • Closing / Reflection
    • What additional support do you think you would need to become a more secure organization?
    • Is there something you wish we had covered or had had more time to cover?


Do you know of anyone who has experienced these kinds of attacks?



  • Intros & Go Around:
    • What other questions or concerns do you have related to Digital Security?
    • Is there anything else missing from your digital security plan?
  • Discuss questions
  • Wrap Up & Evaluation




  • Welcome & Introduction to the Learning Table: 5 minutes
  • Introduction to Assessment Workshop: 5 minutes (Alice) Each organization has written up a needs assessment. Our goal today is to pull those together into a movement/sector needs assessment to find the commonalities that will allow us to focus this series of workshops
  • Discussion of participants' needs assessment: 30 minutes (choose one organization to present to start things off)

This PowerBase online workshop was conducted on Monday, February 12, 2018.

Have you been wanting to creating email templates that look smashingly wonderful on smartphones in PowerBase?

Well, a new extension in PowerBase uses Mosaico which can help you create email templates easily. And you can still use the traditional PowerBase / CiviCRM Mailing feature and still have access to your existing templates. We'll show you how!

Here's documentation on how to use the Mosaico feature in PowerBase.


Welcome & Overview

  • What tools are you using for sharing files and storing files?


  • CIA: Confidentiality, Integrity, Accessibility
  • Risk assessment: Who are you protecting your data from?
  • Subpoena risks?
  • Organizational culture

Options - common tools used for sharing files

What is good about these methods? What is bad about these methods?


The following are training agenda items for PowerBase Administrators. The agenda items here are suggested topics and are covered based on the relevance and priority to the work of the organization.

PowerBase Administrator Training Agenda Items for Organizations

Adding New User Accounts, Roles, Permissions • Custom permissions and Roles

Review Data