Learning system

Build skills that hold under pressure

This training path is staged for people without security background. Each module has a clear outcome and completion signal.

Module 1: Recognize active scam patterns

30 min

You can classify a suspicious request in under 60 seconds.

  • Identify urgency, secrecy, and channel-switch pressure.
  • Use callback verification before action.
  • Escalate uncertain cases without delay.

Module 2: Defend identity and accounts

40 min

You can reduce credential takeover risk across all critical accounts.

  • Use unique credentials managed in one password manager.
  • Enable MFA with strongest available factor.
  • Harden recovery channels before incidents.

Module 3: Reduce exposed personal data

35 min

You can run a recurring footprint cleanup cycle.

  • Audit identifiers and exposed records.
  • Prioritize high-risk removals first.
  • Set a 30-day recheck routine.

Module 4: Respond and report correctly

30 min

You can run first-hour containment without panic.

  • Preserve evidence before cleanup.
  • Stabilize accounts and payment channels quickly.
  • Report to the right agency with quality evidence.

Interactive Lab

Password Strength Checker

Learn what makes a password resilient while passkeys are still rolling out.

Type a password to evaluate

  • Use 14+ characters and avoid reused passwords.

Cadence that keeps working

Weekly (15 min)

Review unknown sign-ins and financial alerts.

Monthly (30 min)

Audit app permissions, extensions, and breach notices.

Quarterly (45 min)

Run an incident drill with family or team roles.

Post-incident (60 min)

Document failure points and update your playbook.

next: study real incident narratives

Guided journey

Step 5 of 9: Learn