Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity Fundamentals: Intro to Digital Security
Welcome
Welcome (0:17)
Class Recordings
Class 1 (85:46)
Class Links - Zoom
Links
Cybersecurity Basics and Threat Awareness
Introduction (0:14)
Phishing
Data Leaks (0:29)
Stuff you post online stays there
Stuff You Do Online Can Stay Online
Government Surveillance
Warrantless Wiretapping
5 Eyes Alliance
Whistleblowers
Conculsion (1:04)
Practices
Introduction to Practices (0:14)
Safe Browsing Practices
Keeping Software Up To Date
Code Words
Passwords, 2FA and more
What Counts as a Strong Password
What is 2FA
What is a passkey
Messaging
Stop Using SMS (0:35)
Signal vs Telegram (1:23)
Stop Using WhatsApp
Best Practices for Signal
HIPPA - The Good and the Bad
What is HIPPA
Limitations of HIPPA
Exposing Data (1:35)
Anonymous Browsing and TOR
Understanding and Using VPN
TOR Explained. Also I2P!
Windows, MAC and Linux. Maybe I should try TAILS?
TAILS explain in 100 seconds
TAILS - "The Amnesic Incognito Live System"
How secure is a Mac and are Macs really more secure than Windows?
PGP Encryption - Keeping files safe
What tools can I use?
Setting up PGP with Proton Mail
Download Kleopatra (Windows)
Cryptocurrency
Why Crypto? (0:14)
How to make a bitcoin address
Monero?
Safe Ways to Store Crypto
AI Safety
A few news stories
Staying Safe
PCs, MAC and Phones
Hardening your OS
Secure Operating Systems
Hardening iOS
Teach online with
Data Leaks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock