Image 1 of 1
Cybersecurity & Data Privacy
Protecting Information in a Digital World
Course Overview
This course equips learners with the knowledge and practical skills to protect digital information, recognize cyber threats, and handle personal and organizational data responsibly. No hoodie required. Just awareness, discipline, and smart habits.
Module 1: Cybersecurity & Data Privacy Fundamentals
Objective: Understand what cybersecurity and data privacy actually mean—and why they matter.
What is cybersecurity vs. data privacy?
Why cybercrime is one of the fastest-growing crimes
Types of data (PII, PHI, financial, confidential)
Who hackers target—and why everyone qualifies
Real-world breaches and lessons learned
Outcome: Learners understand the stakes and their role in security.
Module 2: Common Cyber Threats & Attacks
Objective: Recognize threats before they recognize you.
Malware, ransomware, spyware, and viruses
Phishing, smishing, vishing, and social engineering
Password attacks and credential stuffing
Man-in-the-middle attacks
Insider threats (yes, coworkers count)
Activity: Identify red flags in real scam examples
Outcome: Learners can spot threats quickly and accurately.
Module 3: Passwords, Authentication & Access Control
Objective: Lock the doors—and stop using “password123.”
Strong password creation and management
Password managers (how and why)
Multi-factor authentication (MFA)
Device access controls
Least privilege principle
Outcome: Learners implement stronger access habits immediately.
Module 4: Device, Network & Online Safety
Objective: Secure devices and networks at home and work.
Securing computers, phones, and tablets
Public Wi-Fi risks and VPN basics
Software updates and patching
Safe browsing habits
Downloading safely (or not at all)
Outcome: Learners reduce everyday digital risk.
Module 5: Data Privacy Principles & Responsibilities
Objective: Handle data legally, ethically, and responsibly.
What data privacy really means
Consent and data ownership
Data minimization and retention
Proper data storage and disposal
Privacy by design
Outcome: Learners respect and protect sensitive data.
Module 6: Laws, Regulations & Compliance (Plain English)
Objective: Understand the rules without falling asleep.
Overview of major data protection laws
GDPR (EU)
HIPAA (health data)
CCPA / CPRA (California)
Consequences of non-compliance
Individual vs. organizational responsibility
Outcome: Learners understand legal expectations and risks.
Module 7: Social Engineering & Human Risk
Objective: Defend against manipulation, not just malware.
Psychology behind social engineering
Common manipulation tactics
Impersonation and urgency scams
Workplace and personal scenarios
How to verify before trusting
Activity: Role-play or scenario analysis
Outcome: Learners become harder to trick.
Module 8: Incident Response & Reporting
Objective: Know what to do when something goes wrong.
Signs of a data breach or compromise
Immediate steps to take
Reporting procedures
Containment and recovery basics
Learning from incidents
Outcome: Learners respond quickly and correctly to incidents.
Module 9: Cyber Hygiene & Best Practices
Objective: Build habits that prevent problems long-term.
Daily cybersecurity habits
Safe email and communication practices
Data backup strategies
Personal vs. workplace cybersecurity
Creating a security-first mindset
Outcome: Cybersecurity becomes routine, not reactive.
Module 10: Capstone – Cybersecurity in Real Life
Objective: Apply knowledge to realistic situations.
Case studies (personal, business, organizational)
Risk assessment walkthrough
Privacy decision-making scenarios
Personal cybersecurity action plan
Protecting Information in a Digital World
Course Overview
This course equips learners with the knowledge and practical skills to protect digital information, recognize cyber threats, and handle personal and organizational data responsibly. No hoodie required. Just awareness, discipline, and smart habits.
Module 1: Cybersecurity & Data Privacy Fundamentals
Objective: Understand what cybersecurity and data privacy actually mean—and why they matter.
What is cybersecurity vs. data privacy?
Why cybercrime is one of the fastest-growing crimes
Types of data (PII, PHI, financial, confidential)
Who hackers target—and why everyone qualifies
Real-world breaches and lessons learned
Outcome: Learners understand the stakes and their role in security.
Module 2: Common Cyber Threats & Attacks
Objective: Recognize threats before they recognize you.
Malware, ransomware, spyware, and viruses
Phishing, smishing, vishing, and social engineering
Password attacks and credential stuffing
Man-in-the-middle attacks
Insider threats (yes, coworkers count)
Activity: Identify red flags in real scam examples
Outcome: Learners can spot threats quickly and accurately.
Module 3: Passwords, Authentication & Access Control
Objective: Lock the doors—and stop using “password123.”
Strong password creation and management
Password managers (how and why)
Multi-factor authentication (MFA)
Device access controls
Least privilege principle
Outcome: Learners implement stronger access habits immediately.
Module 4: Device, Network & Online Safety
Objective: Secure devices and networks at home and work.
Securing computers, phones, and tablets
Public Wi-Fi risks and VPN basics
Software updates and patching
Safe browsing habits
Downloading safely (or not at all)
Outcome: Learners reduce everyday digital risk.
Module 5: Data Privacy Principles & Responsibilities
Objective: Handle data legally, ethically, and responsibly.
What data privacy really means
Consent and data ownership
Data minimization and retention
Proper data storage and disposal
Privacy by design
Outcome: Learners respect and protect sensitive data.
Module 6: Laws, Regulations & Compliance (Plain English)
Objective: Understand the rules without falling asleep.
Overview of major data protection laws
GDPR (EU)
HIPAA (health data)
CCPA / CPRA (California)
Consequences of non-compliance
Individual vs. organizational responsibility
Outcome: Learners understand legal expectations and risks.
Module 7: Social Engineering & Human Risk
Objective: Defend against manipulation, not just malware.
Psychology behind social engineering
Common manipulation tactics
Impersonation and urgency scams
Workplace and personal scenarios
How to verify before trusting
Activity: Role-play or scenario analysis
Outcome: Learners become harder to trick.
Module 8: Incident Response & Reporting
Objective: Know what to do when something goes wrong.
Signs of a data breach or compromise
Immediate steps to take
Reporting procedures
Containment and recovery basics
Learning from incidents
Outcome: Learners respond quickly and correctly to incidents.
Module 9: Cyber Hygiene & Best Practices
Objective: Build habits that prevent problems long-term.
Daily cybersecurity habits
Safe email and communication practices
Data backup strategies
Personal vs. workplace cybersecurity
Creating a security-first mindset
Outcome: Cybersecurity becomes routine, not reactive.
Module 10: Capstone – Cybersecurity in Real Life
Objective: Apply knowledge to realistic situations.
Case studies (personal, business, organizational)
Risk assessment walkthrough
Privacy decision-making scenarios
Personal cybersecurity action plan