
The Course
Hey, have you ever been freaked out by stories of hackers and data breaches? You're not alone. Take control of your online safety with this beginner-friendly course.
Build Your Personal Cybersecurity Toolkit teaches you how to recognize threats, protect your data, and apply practical cybersecurity tips—no technical background required.
In under an hour, gain the confidence to secure your digital life at home, work, or on the go.
Course Objectives:
By the end of this course, you will be able to:
- Recognize common cyber threats (phishing, malware, scams)
- Create and manage strong, secure passwords
- Set up two-factor authentication
- Adjust privacy settings on browsers and devices
- Build your cybersecurity action plan
Curriculum

Your instructor
Jennifer Thompson brings to her role as an educator a wealth of knowledge and firsthand experience in the ever-evolving field of cybersecurity. With a career spanning over a decade in the industry, Jennifer has been at the forefront of developing robust security strategies and implementing defensive measures against a wide array of cyber threats. Her rich background includes roles in risk assessment, incident response, and advocacy for stronger data protection measures in both corporate and consulting environments. Jennifer's expertise is rooted in a deep understanding of the technological intricacies and human factors that underpin cybersecurity.
Her passion for the subject is unmistakable and it bleeds into every lesson she teaches in the "Cybersecurity Essentials: Protecting Your Data in a Digital World" course. Jennifer's enthusiasm is driven by her firm belief that knowledge is the first line of defense in the digital realm. She prides herself on her ability to break down complex concepts into relatable and actionable insights for her students. By fostering an interactive and engaging learning atmosphere, Jennifer aspires to empower the next generation of individuals to fortify their digital presence against the myriad of security challenges that lie ahead.

Comprehensive
A Full-Spectrum Guide to Digital Defense Techniques

Proactive
Strategies for Anticipating and Neutralizing Online Threats

Cutting-Edge
Employing the Latest Tools to Secure Your Digital Presence