🛡️ Adult Training Preview
All 30 adult training modules — no login required
Tech-Savvy Adults
For adults comfortable with technology who want to secure their digital life and protect their family
Home Network Security
Harden your home router, segment your network, and keep every connected device safer.
Password Managers & Passkeys
Move beyond password chaos with managers, passkeys, and smart family credential sharing.
Securing Cloud Storage
Lock down Google Drive, iCloud, and Dropbox with proper sharing settings and encryption.
Advanced Phishing & BEC
Recognize and defeat spear phishing, business email compromise, and AI-generated social engineering attacks.
Smart Home Security
Secure your IoT devices, cameras, and smart speakers with proper segmentation and privacy practices.
Secure Communication
Understand end-to-end encryption, choose the right messaging apps, and protect your family's conversations.
Family Incident Response
Know exactly what to do when a breach, identity theft, or security incident hits your family.
Parental Controls That Work
Set up effective content filtering and device management while building trust instead of surveillance.
Identity Theft Prevention
Protect your family's identities with credit monitoring, dark web awareness, and child identity protection strategies.
Teaching Kids About Security
Learn how to have age-appropriate security conversations and build a family security culture.
Everyday Digital Safety
Practical, no-jargon guidance for staying safe online — scam defense, banking, email, and more
Spotting Scam Calls & Texts
Learn to recognize and handle fraudulent phone calls and text messages that try to steal your money or personal information.
Tech Support Scams
Recognize and avoid fake tech support calls, popups, and remote access scams that impersonate companies like Microsoft and Apple.
Romance Scams & Emotional Manipulation
Understand how romance scammers build trust and manipulate emotions, and learn to recognize warning signs before it's too late.
AI Voice Clones & Impersonation
Learn how artificial intelligence can clone voices and create convincing impersonations, and discover practical ways to verify who you're really talking to.
Safe Online Banking & Shopping
Learn how to bank and shop securely online, recognize fake websites, and protect your financial information.
Email Safety
Learn to identify phishing emails, handle suspicious attachments and links, and protect yourself from email-based scams.
Social Media Privacy
Learn how to use social media safely, manage privacy settings, and avoid the tricks that expose your personal information.
Medicare, Health & Government Scams
Recognize scams that impersonate Medicare, the IRS, Social Security, and other government agencies to steal your money and identity.
Keeping Devices Secure
Learn practical steps to keep your phone, tablet, and computer secure with updates, backups, strong passwords, and smart settings.
What To Do When Something Goes Wrong
A practical guide to responding when you've been scammed, hacked, or had your identity stolen — with step-by-step recovery plans and reporting resources.
Security Engineers
Advanced personal security, home infrastructure, and offensive defense for technical professionals
Personal OPSEC
Compartmentalize your digital life to minimize personal attack surface using threat modeling, identity segmentation, and operational discipline.
Secrets Management for Personal Projects
Stop leaking API keys in side projects — master .env hygiene, git-secrets, pre-commit hooks, and cloud secret managers for your personal infrastructure.
Browser Security & Extension Auditing
Audit your browser extensions, understand Manifest V3 security implications, resist fingerprinting, and compartmentalize browsing with profile isolation.
DNS-Level Security
Deploy Pi-hole or NextDNS for network-wide ad/tracker blocking, configure DNS-over-HTTPS/TLS, create per-device profiles, and monitor DNS queries for threats.
Home Network Architecture
Design a segmented home network with VLANs, firewall rules, IDS/IPS, WireGuard VPN, and monitoring dashboards worthy of your professional standards.
Supply Chain Security
Audit your dependencies before they audit you — master npm audit, lockfiles, SBOMs, typosquatting defense, and cryptographic package signing with Sigstore.
Physical Security & Hardware Attacks
Defend against USB attacks, evil maid scenarios, DMA exploits, and hardware implants with FIDO2 keys, secure boot, and physical access controls.
Red Teaming Your Home
Run offensive security assessments against your own home network and digital footprint — reconnaissance, scanning, lateral movement testing, and family social engineering.
Threat Modeling for Families
Apply STRIDE, data flow diagrams, and risk prioritization to your family's digital life — creating a living threat model that drives practical security decisions.
Secure Development for Side Projects
Apply OWASP Top 10, CSP headers, secure defaults, CI/CD hardening, dependency scanning, and container security to your personal projects.