Interactive Security Training

Learn to Defend Yourself Online

Master cybersecurity fundamentals through interactive lessons, real-world simulations, and hands-on challenges

0 Modules Completed
0 Threats Identified
0 Defenses Learned

Security Fundamentals

Build your foundation in cybersecurity concepts

Password Security

Create and manage strong passwords

Click to learn

Two-Factor Auth

Add extra layers of protection

Click to learn

Encryption Basics

How data stays private

Click to learn

Online Privacy

Control your digital footprint

Click to learn

Password Strength Analyzer

Test how secure your passwords really are

Enter a password to check

Know Your Threats

Learn to identify common cyber attacks

Phishing

Deceptive emails and websites designed to steal your information

High Risk

Malware

Viruses, trojans, and ransomware that infect your devices

High Risk

Social Engineering

Manipulation tactics that trick you into revealing information

Medium Risk

Man-in-the-Middle

Attackers intercepting communication between you and websites

Medium Risk

Brute Force

Automated password guessing attacks

Low Risk

WiFi Attacks

Dangers of public and unsecured wireless networks

Medium Risk

Phishing Detection Game

Can you spot the fake emails? Test your detection skills!

Score: 0/10 Streak: 0

Defense Strategies

Practical steps to protect yourself online

Personal Security

Device Security

Online Behavior

Data Protection

Your Security Posture

Complete the checklist above to improve your score

0 %
Personal Security
Device Security
Online Behavior
Data Protection

Identity Theft Protection

Safeguard your identity and financial accounts

Freeze Your Credit

A credit freeze prevents new accounts from being opened in your name. It's free and one of the most effective protections.

1 Contact each credit bureau separately
2 Request a security freeze online or by phone
3 Save your PIN/password to unfreeze later

Monitor Your Accounts

Regular monitoring helps you catch unauthorized activity early before major damage occurs.

Review bank statements weekly
Set up transaction alerts on all cards
Check credit reports annually (free at AnnualCreditReport.com)
Use a credit monitoring service
Review Social Security statements yearly

Protect Your SSN

Your Social Security Number is the master key to your identity. Guard it carefully.

Never carry your SSN card in your wallet
Don't give it out unless absolutely necessary
Ask WHY it's needed and HOW it will be protected
Shred documents containing your SSN

Set Up Fraud Alerts

Fraud alerts require creditors to verify your identity before opening new accounts.

Initial Fraud Alert

Lasts 1 year. Good if you suspect you might be a victim.

Extended Fraud Alert

Lasts 7 years. Requires an identity theft report.

Active Duty Alert

For military personnel. Lasts 1 year, renewable.

Warning Signs of Identity Theft

Bills for accounts you didn't open
Unfamiliar charges on statements
Missing mail or unexpected address changes
Calls from debt collectors about unknown debts
Credit applications denied unexpectedly
Medical bills for services you didn't receive

AI & Emerging Threats

Recognize and defend against next-generation attacks

The New Era of Cyber Threats

Artificial Intelligence has given attackers powerful new tools. Scams that once were easy to spot are now frighteningly convincing.

High Risk

Deepfake Videos & Images

AI-generated fake videos that make anyone appear to say or do anything.

Fake CEO announcements Impersonation scams Blackmail attempts
How to Detect:
  • Look for unnatural blinking or facial movements
  • Check for mismatched lighting or shadows
  • Watch for blurry edges around face/hair
  • Verify through official channels before acting
High Risk

Voice Cloning Scams

AI can clone someone's voice from just a few seconds of audio, enabling convincing phone scams.

"Grandparent" scams Fake kidnapping calls CEO fraud calls
How to Protect Yourself:
  • Establish a family code word for emergencies
  • Always hang up and call back on a known number
  • Be suspicious of urgent requests for money
  • Ask questions only the real person would know
Very High Risk

AI-Generated Phishing

AI writes perfect, personalized phishing emails without the typos and grammar mistakes we used to rely on to spot fakes.

Personalized spear phishing Context-aware scams Perfect grammar attacks
How to Protect Yourself:
  • Don't rely on grammar mistakes to identify scams
  • Verify sender identity through other channels
  • Hover over links before clicking
  • Be extra cautious of unexpected requests
Medium Risk

Malicious AI Chatbots

Fake customer service bots and romance scammers powered by AI that can hold convincing conversations.

Fake support chats Romance scams Investment fraud bots
How to Protect Yourself:
  • Only use official customer service channels
  • Never share sensitive info in chat
  • Be wary of "too perfect" responses
  • Request video calls to verify identity

General AI Scam Detection Tips

Pause Before Acting

Scammers create urgency. Take time to verify before responding to any request.

Verify Independently

Call back using a number you look up yourself, not one provided in the message.

Ask Unexpected Questions

AI and scammers struggle with random, personal questions about shared experiences.

Get a Second Opinion

When in doubt, ask a trusted friend or family member before taking action.

If You've Been Hacked

Step-by-step recovery guide when the worst happens

Don't Panic - Act Quickly

Being hacked is stressful, but swift action can minimize damage. Follow these steps in order.

1

Immediate Actions (First 15 Minutes)

Critical
2

Assess the Damage (First Hour)

High Priority
3

Contact & Report (First 24 Hours)

Important
4

Secure Your Devices (First Week)

Important
5

Long-Term Recovery (Ongoing)

Maintenance

Emergency Contacts & Resources

Your Recovery Progress

0%
Steps Completed

Security Resources

Tools, apps, and further learning materials

Authenticator Apps

Google Authenticator, Authy, or Microsoft Authenticator for 2FA

iOS Android

ProtonMail

End-to-end encrypted email service

iOS Android Web

Signal

Secure, encrypted messaging app

iOS Android

VPN Services

ProtonVPN, Mullvad, or NordVPN for secure browsing

Multi-platform

Cybersecurity at a Glance

95%
of breaches caused by human error
$4.45M
average cost of a data breach
3.4B
phishing emails sent daily
277
days to identify a breach

Security Knowledge Quiz

Put your cybersecurity knowledge to the test

Security Basics

5 questions about fundamental concepts

Not attempted

Threat Recognition

5 questions about identifying attacks

Not attempted

Defense Strategies

5 questions about staying safe

Not attempted

Advanced Security

5 challenging questions for experts

Not attempted
+10 Security IQ
Achievement Unlocked!