Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity Fundamentals: Intro to Digital Security
Welcome
Welcome (0:17)
Class Recordings
Class 1 (85:46)
Class Links - Zoom
Links
Cybersecurity Basics and Threat Awareness
Introduction (0:14)
Phishing
Data Leaks (0:29)
Stuff you post online stays there
Stuff You Do Online Can Stay Online
Government Surveillance
Warrantless Wiretapping
5 Eyes Alliance
Whistleblowers
Conculsion (1:04)
Practices
Introduction to Practices (0:14)
Safe Browsing Practices
Keeping Software Up To Date
Code Words
Passwords, 2FA and more
What Counts as a Strong Password
What is 2FA
What is a passkey
Messaging
Stop Using SMS (0:35)
Signal vs Telegram (1:23)
Stop Using WhatsApp
Best Practices for Signal
HIPPA - The Good and the Bad
What is HIPPA
Limitations of HIPPA
Exposing Data (1:35)
Anonymous Browsing and TOR
Understanding and Using VPN
TOR Explained. Also I2P!
Windows, MAC and Linux. Maybe I should try TAILS?
TAILS explain in 100 seconds
TAILS - "The Amnesic Incognito Live System"
How secure is a Mac and are Macs really more secure than Windows?
PGP Encryption - Keeping files safe
What tools can I use?
Setting up PGP with Proton Mail
Download Kleopatra (Windows)
Cryptocurrency
Why Crypto? (0:14)
How to make a bitcoin address
Monero?
Safe Ways to Store Crypto
AI Safety
A few news stories
Staying Safe
PCs, MAC and Phones
Hardening your OS
Secure Operating Systems
Hardening iOS
Teach online with
Class 1
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock