Module 1: Recognize active scam patterns
30 minYou can classify a suspicious request in under 60 seconds.
- Identify urgency, secrecy, and channel-switch pressure.
- Use callback verification before action.
- Escalate uncertain cases without delay.
This training path is staged for people without security background. Each module has a clear outcome and completion signal.
You can classify a suspicious request in under 60 seconds.
You can reduce credential takeover risk across all critical accounts.
You can run a recurring footprint cleanup cycle.
You can run first-hour containment without panic.
Interactive Lab
Learn what makes a password resilient while passkeys are still rolling out.
Type a password to evaluate
Weekly (15 min)
Review unknown sign-ins and financial alerts.
Monthly (30 min)
Audit app permissions, extensions, and breach notices.
Quarterly (45 min)
Run an incident drill with family or team roles.
Post-incident (60 min)
Document failure points and update your playbook.
Guided journey
Step 5 of 9: Learn