π Home > Cybersecurity > Personal Defense > Module 4
Module 4: Home & Device Security
Overview
This module teaches students to secure their home networks, IoT devices, and personal computers. Learn to protect your digital infrastructure from external threats and create a secure home computing environment.
Learning Duration
[To be determined]
Prerequisites
- Home WiFi network
- Personal computer or laptop
- Basic understanding of network devices
- No technical expertise required
Topics
4.1 Securing the Home Network: Router Security & Guest Wi-Fi
Key Concepts:
- Router security fundamentals
- WiFi encryption standards
- Network segmentation
- Guest network isolation
Content Areas:
Router Configuration
- Changing default admin credentials
- Updating router firmware
- Disabling WPS (Wi-Fi Protected Setup)
- Disabling remote management
- Changing default IP ranges
- Enabling firewall features
WiFi Security
- WPA3 vs. WPA2 encryption
- Creating strong WiFi passwords
- Hiding SSID (pros and cons)
- MAC address filtering (limitations)
- WiFi channel optimization
Guest Network Setup
- Creating isolated guest networks
- Setting guest network bandwidth limits
- Guest network access controls
- IoT device segregation
[Detailed content to be added]
4.2 IoT Hygiene: Smart Cameras, Speakers, and Appliances
Key Concepts:
- IoT device risks
- Default credential changes
- Network isolation
- Privacy considerations
Device-Specific Security:
Smart Cameras & Doorbells
- Changing default passwords
- Enabling two-factor authentication
- Configuring privacy zones
- Reviewing cloud storage settings
- Disabling unnecessary features
- Regular firmware updates
Smart Speakers & Assistants
- Voice recording settings
- Privacy mode configuration
- Mute button usage
- Purchase protection
- Third-party skill permissions
Smart Appliances
- Refrigerators, TVs, thermostats
- Limiting internet connectivity
- Firmware update management
- Data collection awareness
IoT Best Practices
- Creating device inventory
- Regular security audits
- Decommissioning old devices
- Researching before purchasing
[Detailed content to be added]
4.3 Endpoint Protection: Antivirus vs. EDR for Personal Use
Key Concepts:
- Antivirus software
- Endpoint Detection and Response (EDR)
- Built-in security features
- Security software comparison
Platform-Specific Protection:
Windows Security
- Windows Defender configuration
- Windows Firewall settings
- Windows Update management
- User Account Control (UAC)
- BitLocker encryption
- Controlled folder access
macOS Security
- Gatekeeper and XProtect
- FileVault encryption
- Firewall configuration
- Privacy & Security settings
- System Integrity Protection
- Third-party antivirus options
Linux Security
- Package manager security
- Firewall (UFW/iptables)
- Automatic updates
- SELinux/AppArmor
- ClamAV antivirus
Security Software Options
- Free vs. paid antivirus comparison
- Malwarebytes
- Norton, Bitdefender, Kaspersky
- EDR for home users
- Performance considerations
[Detailed content to be added]
4.4 Safe Public Wi-Fi Usage & VPN Essentials
Key Concepts:
- Public WiFi risks
- VPN technology
- VPN selection criteria
- Alternative security measures
Content Areas:
Public WiFi Dangers
- Man-in-the-Middle (MITM) attacks
- Evil twin networks
- Packet sniffing risks
- Unencrypted connections
- Fake hotspots
VPN Fundamentals
- What is a VPN and how it works
- VPN protocols (WireGuard, OpenVPN, IKEv2)
- VPN encryption explained
- DNS leak protection
- Kill switch feature
Choosing a VPN
- No-log policies
- Server locations
- Speed and performance
- Privacy jurisdiction
- Price and features
- Red flags to avoid
Recommended VPN Services
- ProtonVPN
- Mullvad
- IVPN
- [Additional recommendations to be added]
Alternative Protection
- Cellular hotspot usage
- HTTPS Everywhere
- Avoiding sensitive transactions
- Mobile data as alternative
[Detailed content to be added]
Practical Exercises
Exercise 1: Router Security Audit
Objective: Secure your home router Duration: [To be added] Checklist:
- Change admin password
- Update firmware
- Configure WPA3 encryption
- Set up guest network
- Disable unnecessary features
- Document changes
Exercise 2: IoT Device Inventory & Hardening
Objective: Catalog and secure all IoT devices Duration: [To be added] Tasks:
- Create complete device inventory
- Change all default passwords
- Update firmware on all devices
- Move IoT devices to isolated network
- Disable unnecessary features
Exercise 3: Endpoint Security Configuration
Objective: Secure all personal computers Duration: [To be added] Platform-specific steps: [To be added]
Exercise 4: VPN Setup and Testing
Objective: Configure and test VPN connection Duration: [To be added] Steps:
- Research and select VPN provider
- Install VPN client
- Configure VPN settings
- Test for DNS leaks
- Test kill switch
- Verify connection security
Home Network Diagram Template
[Internet]
|
[Modem/Router]
|
βββ [Main Network (WPA3)]
β βββ Personal Computers
β βββ Smartphones
β βββ Trusted Devices
β
βββ [Guest Network]
β βββ Visitor Devices
β
βββ [IoT Network (Isolated)]
βββ Smart Cameras
βββ Smart Speakers
βββ Smart Appliances
[Customizable template to be added]
Quick Reference: Security Checklists
Monthly Security Tasks
- Update router firmware
- Update all device firmware
- Review connected devices
- Check for unauthorized access
- Review security logs
Quarterly Tasks
- Change router passwords
- Audit IoT devices
- Review VPN performance
- Test backup systems
Annual Tasks
- Complete network security audit
- Evaluate new security technologies
- Replace aging hardware
- Review and update security policies
Troubleshooting Guide
Common Issues
Problem: Canβt access router admin panel Solutions: [To be added]
Problem: Devices canβt connect after security changes Solutions: [To be added]
Problem: VPN connection drops frequently Solutions: [To be added]
[Additional scenarios to be added]
Assessment
Home Network Security Audit
Components to evaluate:
- Router security posture
- WiFi encryption strength
- IoT device security
- Endpoint protection status
- VPN configuration
- Overall security score
Knowledge Check
- What is WPA3 and why is it important?
- Name three risks of public WiFi
- What features should you look for in a VPN?
- Why should IoT devices be on a separate network?
Practical Assessment
Title: Secure Home Network Implementation Requirements: [To be added] Documentation: [To be added]
Resources
Router Configuration Guides
- [Brand-specific router guides]
- [Common router default credentials database]
- [Firmware update instructions]
IoT Security Resources
- [IoT security checklist]
- [Smart home security best practices]
- [Device-specific hardening guides]
VPN Resources
- VPN comparison tools
- DNS leak test sites
- Speed test tools
- Privacy-focused VPN reviews
Tools
- Router Admin Finders
- Network scanning tools (Fing, Angry IP Scanner)
- WiFi analyzers
- Security audit tools
Recommended Reading
- [Home network security guides]
- [IoT security research]
- [VPN privacy reports]
Last Updated: 2026-01-07