Duration: 5 Hours
Format: Asynchronous Presentation Based
Pedagogical Model: Case Method + Discussion Driven + Behavioral Science + Applied Security Design
Core Thesis
Digital safety is not technical literacy. It is the disciplined practice of risk awareness, boundary design, and informed decision-making in networked environments shaped by asymmetrical power and invisible surveillance.
Learning Outcomes
By the end of this course, participants will be able to:
- Analyze digital threats through behavioral psychology and technical risk models.
- Evaluate credibility signals within digital communications using structured verification frameworks.
- Construct a layered digital identity protection system (password architecture + 2FA).
- Diagnose social engineering attempts using cognitive bias identification.
- Design and defend a personal Digital Safety Protocol under attack conditions.
Topics Covered
MODULE 1: Digital Identity & Risk Architecture (60 minutes)
- Digital Identity as layered presence (academic, social, financial, biometric)
- Attack Surface Mapping: Where are you exposed?
- Risk Equation: Risk = Vulnerability × Threat × Exposure
- Password Architecture Design
- Checkpoint: Scenario-based risk prioritization
MODULE 2: Authentication, Authority & Access Control (60 minutes)
- Knowledge-based vs possession-based authentication
- Multi-factor authentication logic
- Zero-trust security principles
- Authentication fatigue risks
- 2FA Implementation
- Checkpoint: OTP breach response protocol
MODULE 3: Social Engineering, Phishing & Manipulation (120 minutes)
- Social engineering lifecycle
- Cognitive biases exploited in scams
- Types: Email phishing, Instagram brand collab scams, Scholarship scams, Impersonation, Sextortion, Deepfake threats
- Scam Dissection Exercise
- Case Study: “The Dream Opportunity”
- Advanced Threats: AI-generated phishing
- Checkpoint: Analytical justification of threat effectiveness
MODULE 4: Privacy, Surveillance & Digital Footprint (60 minutes)
- Digital permanence and algorithmic amplification
- Data brokers and reputation economy
- Digital Exposure Audit
- Privacy settings optimization
- Checkpoint: Reputational risk reflection
MODULE 5: Building a Personal Security Framework (60 minutes)
- Designing a Digital Safety Protocol
- Password architecture plan
- Authentication coverage map
- Scam verification checklist
- Social boundary rules
- Emergency escalation plan
- Capstone: Red Team / Blue Team Exercise
Final Outcome
Participants leave with:
- Structured password architecture
- 2FA implemented
- Privacy optimized
- Scam verification protocol
- Digital Safety Charter
- Defensive decision-making skills
Psychological Safety Layer
Trauma-informed elements:
- Non-blaming language
- Confidential discussion policy
- Blackmail response protocol
- Reporting pathways
- Emotional resilience framing
- Support network mapping exercise