🛡️ Adult Training Preview

All 10 adult training modules — no login required

⚙️

Security Engineers

Advanced personal security, home infrastructure, and offensive defense for technical professionals

🕵️
Module 1 of 10

Personal OPSEC

Compartmentalize your digital life to minimize personal attack surface using threat modeling, identity segmentation, and operational discipline.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🔐
Module 2 of 10

Secrets Management for Personal Projects

Stop leaking API keys in side projects — master .env hygiene, git-secrets, pre-commit hooks, and cloud secret managers for your personal infrastructure.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🌐
Module 3 of 10

Browser Security & Extension Auditing

Audit your browser extensions, understand Manifest V3 security implications, resist fingerprinting, and compartmentalize browsing with profile isolation.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🔍
Module 4 of 10

DNS-Level Security

Deploy Pi-hole or NextDNS for network-wide ad/tracker blocking, configure DNS-over-HTTPS/TLS, create per-device profiles, and monitor DNS queries for threats.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🏗️
Module 5 of 10

Home Network Architecture

Design a segmented home network with VLANs, firewall rules, IDS/IPS, WireGuard VPN, and monitoring dashboards worthy of your professional standards.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
📦
Module 6 of 10

Supply Chain Security

Audit your dependencies before they audit you — master npm audit, lockfiles, SBOMs, typosquatting defense, and cryptographic package signing with Sigstore.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🔧
Module 7 of 10

Physical Security & Hardware Attacks

Defend against USB attacks, evil maid scenarios, DMA exploits, and hardware implants with FIDO2 keys, secure boot, and physical access controls.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🏴‍☠️
Module 8 of 10

Red Teaming Your Home

Run offensive security assessments against your own home network and digital footprint — reconnaissance, scanning, lateral movement testing, and family social engineering.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
🎯
Module 9 of 10

Threat Modeling for Families

Apply STRIDE, data flow diagrams, and risk prioritization to your family's digital life — creating a living threat model that drives practical security decisions.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips
💻
Module 10 of 10

Secure Development for Side Projects

Apply OWASP Top 10, CSP headers, secure defaults, CI/CD hardening, dependency scanning, and container security to your personal projects.

📖 5 lessons 🎭 6 scenario steps 📝 6 quiz Qs 💡 5 tips

🛡️ CyberSafe — Online safety training for the whole family.