Optimize Your Privacy

You may feel you have nothing to hide, but you definitely have something to protect.

Learn how to safeguard your personal information from info-scrapping websites, online stalkers, and internet scammers.

Securing Your Computer
Securing Your Computer

In section one, we’ll be covering four tasks.

Each one will be preceded by the level of difficulty and time needed to complete so that you can plan efficiently.

Protecting Data in Motion
Protecting Data in Motion

Some of the things we'll cover in section two are password management, creating strong online credentials, establishing a secure email account, and simplifying two-factor authentication.

Mobile Devices and Secure Communications
Mobile Communications

Section three is all about securing your mobile devices and establishing secure communications. This includes encrypted texts, calls, video chat, and file sharing.

What's in the Course

  Full Course Overview
Available in days
days after you enroll
  Section One-A: Securing Your Computer
Available in days
days after you enroll
  Section One-B: Securing Your Computer
Available in days
days after you enroll
  Section One Worksheet and Resource Links
Available in days
days after you enroll
  Section Two-A: Protecting Data in Motion
Available in days
days after you enroll
  Section Two-B: Protecting Data in Motion
Available in days
days after you enroll
  Section Two Worksheet and Resource Links
Available in days
days after you enroll
  Section Three-A: Mobile Devices and Digital Communications
Available in days
days after you enroll
  Section Three-B: Mobile Devices and Digital Communications
Available in days
days after you enroll
  Bonus Section
Available in days
days after you enroll

Choose a Pricing Option