🏠 Home > Cybersecurity > Personal Defense
Class 2: Personal Digital Defense & Privacy
Course Focus
Identity Protection, Anti-Fraud, Smart Home Security
Target Audience
- General public seeking to enhance digital security
- Remote workers and digital nomads
- Parents protecting family digital assets
- Small business owners
- Privacy-conscious individuals
Course Description
This class empowers individuals to protect their digital identity, privacy, and personal devices in an increasingly connected world. Students will learn practical techniques to defend against modern threats including AI-powered scams, identity theft, and privacy violations. No prior cybersecurity knowledge required.
Modules
- Next-Gen Identity Management
- Countering Social Engineering & AI Scams
- Privacy & Data Sovereignty
- Home & Device Security
Module 1: Next-Gen Identity Management
Overview
Moving beyond passwords to modern authentication methods and protecting your digital identity.
Topics Covered
1.1 Beyond Passwords: Transition to Passkeys
- Understanding FIDO2 and WebAuthn standards
- Setting up passkeys on devices
- Passkey vs. password security comparison
- Migration strategies from passwords
- [Content to be added]
1.2 Multi-Factor Authentication Best Practices
- Types of MFA (SMS, authenticator apps, hardware keys)
- Security comparison of MFA methods
- Setting up MFA across critical accounts
- Backup and recovery strategies
- [Content to be added]
1.3 Managing Digital Footprints
- Understanding your online presence
- Shadow profiles and data brokers
- Removing personal information from the web
- Monitoring your digital identity
- [Content to be added]
1.4 Secure Password Managers
- Choosing a password manager
- Best practices for master passwords
- Emergency access and recovery
- Sharing credentials securely
- [Content to be added]
Learning Objectives
- Implement passkeys for passwordless authentication
- Set up robust MFA across all accounts
- Reduce digital footprint and manage online presence
- Securely manage passwords and credentials
Resources
- [To be added]
Module 2: Countering Social Engineering & AI Scams
Overview
Recognizing and defending against sophisticated social engineering attacks powered by AI.
Topics Covered
2.1 Spotting Deepfakes
- Audio deepfakes and vishing (voice phishing)
- Video deepfake detection techniques
- Real-time verification methods
- Tools for deepfake analysis
- [Content to be added]
2.2 Phishing 2.0: AI-Generated Attacks
- Evolution of phishing techniques
- Identifying AI-generated emails
- Business Email Compromise (BEC) scams
- URL and link verification
- [Content to be added]
2.3 Smishing & Quishing
- SMS phishing (smishing) tactics
- QR code fraud (quishing) awareness
- Mobile-specific attack vectors
- Safe QR code scanning practices
- [Content to be added]
2.4 Psychological Triggers in Scams
- Urgency and fear tactics
- Authority and trust exploitation
- Scarcity and exclusivity manipulation
- Building resilience against social engineering
- [Content to be added]
Learning Objectives
- Identify deepfake audio and video content
- Recognize sophisticated phishing attempts
- Safely handle suspicious messages and QR codes
- Understand psychological manipulation techniques
Resources
- [To be added]
Module 3: Privacy & Data Sovereignty
Overview
Taking control of your personal data and protecting your privacy across digital platforms.
Topics Covered
3.1 Hardening Social Media Settings
- Facebook privacy configuration
- Instagram security settings
- LinkedIn privacy controls
- TikTok, X (Twitter), and other platforms
- [Content to be added]
3.2 Mobile OS Security
- iOS privacy settings and features
- Android privacy controls
- App permission management
- Location tracking and privacy
- [Content to be added]
3.3 Browser Privacy
- Cookie management and tracking prevention
- Browser fingerprinting protection
- Privacy-focused browsers and extensions
- Search engine privacy considerations
- [Content to be added]
3.4 App Permissions & Data Harvesting
- Understanding app permissions
- Identifying data harvesting apps
- Minimizing data collection
- Privacy policy review essentials
- [Content to be added]
Learning Objectives
- Configure privacy settings across social media platforms
- Optimize mobile device privacy controls
- Implement browser privacy protections
- Evaluate and manage app permissions
Resources
- [To be added]
Module 4: Home & Device Security
Overview
Securing your home network, IoT devices, and personal endpoints.
Topics Covered
4.1 Securing the Home Network
- Router security configuration
- Strong WiFi passwords and encryption
- Guest network setup
- Network monitoring tools
- [Content to be added]
4.2 IoT Hygiene
- Securing smart cameras and doorbells
- Smart speaker privacy settings
- Smart appliance security
- IoT device inventory and management
- [Content to be added]
4.3 Endpoint Protection
- Antivirus vs. EDR for personal use
- Windows security features
- macOS security settings
- Linux security basics
- [Content to be added]
4.4 Safe Public Wi-Fi & VPN
- Risks of public WiFi networks
- VPN selection criteria
- VPN configuration and usage
- Alternative security measures
- [Content to be added]
Learning Objectives
- Secure home network infrastructure
- Implement IoT device security best practices
- Configure endpoint protection on personal devices
- Use VPNs safely for public WiFi access
Resources
- [To be added]
Practical Exercises
Security Audit Checklists
- Personal account security audit
- Home network security assessment
- Privacy settings review
- Digital footprint analysis
Hands-on Activities
- [To be added]
Real-World Scenarios
- [To be added]
Additional Resources
Recommended Tools
- Password Managers: [To be added]
- MFA Solutions: [To be added]
- Privacy Tools: [To be added]
- VPN Services: [To be added]
Further Reading
- [To be added]
Helpful Websites
- Have I Been Pwned (breach checking)
- Privacy Guides
- Electronic Frontier Foundation (EFF)
Last Updated: 2026-01-07