- 13 Sections
- 49 Lessons
- 2 Weeks
Expand all sectionsCollapse all sections
- Module 0: Welcome to the Course!Begin your journey into digital security by understanding what this course is all about. In this module, you’ll get oriented with the structure, goals, and navigation of the course. You’ll also reflect on your personal motivations through a short survey. This is your launchpad into learning how to take control of your digital presence.3
- Module 1: Reduce Your Digital FootprintYour digital footprint is the trail of data you leave behind every time you browse, post, or interact online. In this module, you’ll learn how to assess what’s publicly available about you—and how to start minimizing your exposure. You’ll take practical steps to search for your information online, evaluate your social media presence, and make immediate improvements to your privacy.5
- Module 2: Social Media Best PracticesLearn how to recognize the hidden risks of social media and implement simple, effective strategies to safeguard your personal information online. This section focuses on turning awareness into action.6
- Module 3: Account SecurityYou likely have dozens—maybe hundreds—of online accounts. Each one is a potential vulnerability if not properly secured. In this module, you’ll learn how to lock down your digital identity using strong passwords, two-factor authentication, and security best practices. You’ll also explore how to protect your data through backups and how to recognize suspicious requests that could compromise your safety.5
- Module 4: Mindful PostingWhat you share online can reveal more than you intend—about your habits, your location, your relationships, and even your vulnerabilities. This module helps you build better posting habits by recognizing what your photos, captions, and tags communicate to others. You'll also explore the long-term risks of oversharing and learn how to balance authenticity with privacy.5
- Module 5: Family AccountsDigital security doesn’t stop with you. Your online safety can be compromised if family members—especially kids, elders, or less tech-savvy relatives—are oversharing, using weak passwords, or ignoring privacy settings. In this module, you’ll learn how to extend good security practices to your family, including how to start productive conversations about online safety, how to configure family safety tools, and how to work together to build a shared digital safety culture.5
- Module 6: App Permissions“There’s an app for that”—and probably too many on your phone. Most of us install apps without thinking twice about what they’re doing behind the scenes. Some apps collect data they don’t need, access features they shouldn’t, or quietly track your location. In this module, you’ll learn how to evaluate mobile apps for safety, understand what permissions they’re really asking for, and take back control of your data—one tap at a time.5
- Module 7: Removing Personally Identifiable Information (PII)Even if you've taken steps to reduce your digital footprint, sensitive personal information may still be floating around on the internet. In this module, you'll learn how to identify where your PII is being shared—and what you can do to remove it. Whether you're using paid services or free manual methods, you'll walk away with actionable strategies for taking back control of your data.4
- Module 8: Misconceptions About Services and Data BrokersMany online services—especially free ones—are built on collecting and monetizing your personal data. In this module, you’ll uncover how data brokers work, the myths surrounding “free” platforms, and how to think critically about the services you use.4
- Module 9: Credit Report Best PracticesYour credit report holds a surprising amount of sensitive personal information—and it's often a target for identity theft. This module focuses on how to monitor, protect, and control access to your credit reports using free tools and simple habits. You'll also complete a hands-on activity that improves your real-world security in minutes.4
- Module 10: Phone SecuritySmartphones are deeply woven into our daily lives. They hold sensitive information, access points to our accounts, and direct lines to people and services. But how secure are they? This module empowers you with best practices to lock down your phone and stay protected from digital threats.5
- Module 11: COmputer SecurityYour computer is a gateway to your identity, data, and communication. From system updates to password managers and private browsing tools, there’s a lot you can do to make your device more secure. This module walks you through core practices and tools that strengthen your digital safety on laptops and desktops.5
- Module 12: Email, Web, and Financial SecurityYour inbox is more dangerous than it looks. From phishing emails to malware-infected downloads, some of the most common—and costly—digital threats start with a simple message or link. This module is all about building your instincts for safer communication, browsing, and financial behavior online.5
Activity: Digital Security 101 – Pre-Course Survey
Next