🛡️ Adult Training Preview

All 30 adult training modules — no login required

💻

Tech-Savvy Adults

For adults comfortable with technology who want to secure their digital life and protect their family

🌐
Module 1 of 10

Home Network Security

Harden your home router, segment your network, and keep every connected device safer.

📖 5 lessons 🎭 8 scenario steps 📝 6 quiz Qs 💡 5 tips
🔑
Module 2 of 10

Password Managers & Passkeys

Move beyond password chaos with managers, passkeys, and smart family credential sharing.

📖 5 lessons 🎭 7 scenario steps 📝 6 quiz Qs 💡 5 tips
☁️
Module 3 of 10

Securing Cloud Storage

Lock down Google Drive, iCloud, and Dropbox with proper sharing settings and encryption.

📖 5 lessons 🎭 8 scenario steps 📝 6 quiz Qs 💡 5 tips
🎣
Module 4 of 10

Advanced Phishing & BEC

Recognize and defeat spear phishing, business email compromise, and AI-generated social engineering attacks.

📖 5 lessons 🎭 7 scenario steps 📝 6 quiz Qs 💡 5 tips
🏠
Module 5 of 10

Smart Home Security

Secure your IoT devices, cameras, and smart speakers with proper segmentation and privacy practices.

📖 5 lessons 🎭 7 scenario steps 📝 6 quiz Qs 💡 5 tips
💬
Module 6 of 10

Secure Communication

Understand end-to-end encryption, choose the right messaging apps, and protect your family's conversations.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🚨
Module 7 of 10

Family Incident Response

Know exactly what to do when a breach, identity theft, or security incident hits your family.

📖 5 lessons 🎭 7 scenario steps 📝 6 quiz Qs 💡 5 tips
👨‍👩‍👧
Module 8 of 10

Parental Controls That Work

Set up effective content filtering and device management while building trust instead of surveillance.

📖 5 lessons 🎭 7 scenario steps 📝 6 quiz Qs 💡 5 tips
🪪
Module 9 of 10

Identity Theft Prevention

Protect your family's identities with credit monitoring, dark web awareness, and child identity protection strategies.

📖 5 lessons 🎭 7 scenario steps 📝 6 quiz Qs 💡 5 tips
🎓
Module 10 of 10

Teaching Kids About Security

Learn how to have age-appropriate security conversations and build a family security culture.

📖 5 lessons 🎭 7 scenario steps 📝 6 quiz Qs 💡 5 tips
🏡

Everyday Digital Safety

Practical, no-jargon guidance for staying safe online — scam defense, banking, email, and more

📱
Module 1 of 10

Spotting Scam Calls & Texts

Learn to recognize and handle fraudulent phone calls and text messages that try to steal your money or personal information.

📖 5 lessons 🎭 10 scenario steps 📝 6 quiz Qs 💡 5 tips
🖥️
Module 2 of 10

Tech Support Scams

Recognize and avoid fake tech support calls, popups, and remote access scams that impersonate companies like Microsoft and Apple.

📖 5 lessons 🎭 11 scenario steps 📝 6 quiz Qs 💡 5 tips
💔
Module 3 of 10

Romance Scams & Emotional Manipulation

Understand how romance scammers build trust and manipulate emotions, and learn to recognize warning signs before it's too late.

📖 5 lessons 🎭 11 scenario steps 📝 6 quiz Qs 💡 5 tips
🎙️
Module 4 of 10

AI Voice Clones & Impersonation

Learn how artificial intelligence can clone voices and create convincing impersonations, and discover practical ways to verify who you're really talking to.

📖 5 lessons 🎭 10 scenario steps 📝 6 quiz Qs 💡 5 tips
🏦
Module 5 of 10

Safe Online Banking & Shopping

Learn how to bank and shop securely online, recognize fake websites, and protect your financial information.

📖 5 lessons 🎭 12 scenario steps 📝 6 quiz Qs 💡 5 tips
📧
Module 6 of 10

Email Safety

Learn to identify phishing emails, handle suspicious attachments and links, and protect yourself from email-based scams.

📖 5 lessons 🎭 11 scenario steps 📝 6 quiz Qs 💡 5 tips
📘
Module 7 of 10

Social Media Privacy

Learn how to use social media safely, manage privacy settings, and avoid the tricks that expose your personal information.

📖 5 lessons 🎭 10 scenario steps 📝 6 quiz Qs 💡 5 tips
🏥
Module 8 of 10

Medicare, Health & Government Scams

Recognize scams that impersonate Medicare, the IRS, Social Security, and other government agencies to steal your money and identity.

📖 5 lessons 🎭 9 scenario steps 📝 6 quiz Qs 💡 5 tips
📲
Module 9 of 10

Keeping Devices Secure

Learn practical steps to keep your phone, tablet, and computer secure with updates, backups, strong passwords, and smart settings.

📖 5 lessons 🎭 9 scenario steps 📝 6 quiz Qs 💡 5 tips
🆘
Module 10 of 10

What To Do When Something Goes Wrong

A practical guide to responding when you've been scammed, hacked, or had your identity stolen — with step-by-step recovery plans and reporting resources.

📖 5 lessons 🎭 11 scenario steps 📝 6 quiz Qs 💡 5 tips
⚙️

Security Engineers

Advanced personal security, home infrastructure, and offensive defense for technical professionals

🕵️
Module 1 of 10

Personal OPSEC

Compartmentalize your digital life to minimize personal attack surface using threat modeling, identity segmentation, and operational discipline.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🔐
Module 2 of 10

Secrets Management for Personal Projects

Stop leaking API keys in side projects — master .env hygiene, git-secrets, pre-commit hooks, and cloud secret managers for your personal infrastructure.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🌐
Module 3 of 10

Browser Security & Extension Auditing

Audit your browser extensions, understand Manifest V3 security implications, resist fingerprinting, and compartmentalize browsing with profile isolation.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🔍
Module 4 of 10

DNS-Level Security

Deploy Pi-hole or NextDNS for network-wide ad/tracker blocking, configure DNS-over-HTTPS/TLS, create per-device profiles, and monitor DNS queries for threats.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🏗️
Module 5 of 10

Home Network Architecture

Design a segmented home network with VLANs, firewall rules, IDS/IPS, WireGuard VPN, and monitoring dashboards worthy of your professional standards.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
📦
Module 6 of 10

Supply Chain Security

Audit your dependencies before they audit you — master npm audit, lockfiles, SBOMs, typosquatting defense, and cryptographic package signing with Sigstore.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🔧
Module 7 of 10

Physical Security & Hardware Attacks

Defend against USB attacks, evil maid scenarios, DMA exploits, and hardware implants with FIDO2 keys, secure boot, and physical access controls.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🏴‍☠️
Module 8 of 10

Red Teaming Your Home

Run offensive security assessments against your own home network and digital footprint — reconnaissance, scanning, lateral movement testing, and family social engineering.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🎯
Module 9 of 10

Threat Modeling for Families

Apply STRIDE, data flow diagrams, and risk prioritization to your family's digital life — creating a living threat model that drives practical security decisions.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
💻
Module 10 of 10

Secure Development for Side Projects

Apply OWASP Top 10, CSP headers, secure defaults, CI/CD hardening, dependency scanning, and container security to your personal projects.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips

🛡️ CyberSafe — Online safety training for the whole family.