Master cybersecurity fundamentals through interactive lessons, real-world simulations, and hands-on challenges
Build your foundation in cybersecurity concepts
Create and manage strong passwords
Add extra layers of protection
How data stays private
Control your digital footprint
Test how secure your passwords really are
Learn to identify common cyber attacks
Deceptive emails and websites designed to steal your information
High RiskViruses, trojans, and ransomware that infect your devices
High RiskManipulation tactics that trick you into revealing information
Medium RiskAttackers intercepting communication between you and websites
Medium RiskAutomated password guessing attacks
Low RiskDangers of public and unsecured wireless networks
Medium RiskCan you spot the fake emails? Test your detection skills!
Practical steps to protect yourself online
Complete the checklist above to improve your score
Safeguard your identity and financial accounts
A credit freeze prevents new accounts from being opened in your name. It's free and one of the most effective protections.
Regular monitoring helps you catch unauthorized activity early before major damage occurs.
Your Social Security Number is the master key to your identity. Guard it carefully.
Fraud alerts require creditors to verify your identity before opening new accounts.
Lasts 1 year. Good if you suspect you might be a victim.
Lasts 7 years. Requires an identity theft report.
For military personnel. Lasts 1 year, renewable.
Recognize and defend against next-generation attacks
AI-generated fake videos that make anyone appear to say or do anything.
AI can clone someone's voice from just a few seconds of audio, enabling convincing phone scams.
AI writes perfect, personalized phishing emails without the typos and grammar mistakes we used to rely on to spot fakes.
Fake customer service bots and romance scammers powered by AI that can hold convincing conversations.
Scammers create urgency. Take time to verify before responding to any request.
Call back using a number you look up yourself, not one provided in the message.
AI and scammers struggle with random, personal questions about shared experiences.
When in doubt, ask a trusted friend or family member before taking action.
Step-by-step recovery guide when the worst happens
Tools, apps, and further learning materials
Google Authenticator, Authy, or Microsoft Authenticator for 2FA
End-to-end encrypted email service
Secure, encrypted messaging app
ProtonVPN, Mullvad, or NordVPN for secure browsing
Put your cybersecurity knowledge to the test
5 questions about fundamental concepts
5 questions about identifying attacks
5 questions about staying safe
5 challenging questions for experts