Everyday Information Security

title block image for everyday Information Security

In today’s digital age, understanding how to protect your personal information and devices is crucial. This course provides a comprehensive introduction to information security, covering essential topics such as information security threats, safe online behavior, secure password practices, and data protection. Whether you’re a neighborhood center, school, church, or other community-minded organization interested in helping people safeguard their digital life, this course will equip learners with the knowledge and skills to stay safe online.


Course objectives

  • Understand the importance of information security in everyday life.
  • Identify common information security threats and their potential impact.
  • Learn best practices for safe online browsing, email usage, and social media.
  • Develop strong password habits and recognize the importance of two-factor authentication.
  • Explore strategies for protecting personal data and privacy online.
  • Recognize phishing attempts and other common scams.
  • Understand the basics of malware and how to protect against it.
  • Learn about the importance of software updates and how to keep your devices secure.

Who is this course for

This course is for individuals who are keen to enhance their understanding of information security and protect themselves in the digital world. People who are everyday internet users who want to safeguard their personal information, devices, and online activities from information security threats. This includes students, professionals, seniors, and everyday people who recognize the importance of staying safe online but do not have a technical background. People who are proactive about their digital safety and seek practical knowledge and skills to navigate the online landscape securely.

What is not covered

This is a high-level course to introduce learners to the concepts and best practices in informationsecurity, not necessarily the step-by-step of implementation. This is not a deep dive into the weeds of the high-tech world.

Who is involved

Jonathon Miller – An accomplished instructional designer, trainer, and e-learning developer with over two decades of experience. With a diverse background encompassing high-tech, heavy construction, healthcare, and education, Jonathon has honed his skills in creating effective and engaging learning experiences.

Regularly review of this conducted for accuracy and timeliness by Matthew S., CISSP. Matthew is an information security professional with over 15 years of experience in his field. He regularly works with large, high-profile clients with demanding security needs.

Want to learn more?

Please enable JavaScript in your browser to complete this form.
Name