Code for Pakistan

Digital Safety & Online Security

Learn to protect yourself online with essential security practices and privacy management.

Duration: 5 Hours
Format: Asynchronous Presentation Based
Pedagogical Model: Case Method + Discussion Driven + Behavioral Science + Applied Security Design

Core Thesis

Digital safety is not technical literacy. It is the disciplined practice of risk awareness, boundary design, and informed decision-making in networked environments shaped by asymmetrical power and invisible surveillance.

Learning Outcomes

By the end of this course, participants will be able to:

  1. Analyze digital threats through behavioral psychology and technical risk models.
  2. Evaluate credibility signals within digital communications using structured verification frameworks.
  3. Construct a layered digital identity protection system (password architecture + 2FA).
  4. Diagnose social engineering attempts using cognitive bias identification.
  5. Design and defend a personal Digital Safety Protocol under attack conditions.

Topics Covered

MODULE 1: Digital Identity & Risk Architecture (60 minutes)

  • Digital Identity as layered presence (academic, social, financial, biometric)
  • Attack Surface Mapping: Where are you exposed?
  • Risk Equation: Risk = Vulnerability × Threat × Exposure
  • Password Architecture Design
  • Checkpoint: Scenario-based risk prioritization

MODULE 2: Authentication, Authority & Access Control (60 minutes)

  • Knowledge-based vs possession-based authentication
  • Multi-factor authentication logic
  • Zero-trust security principles
  • Authentication fatigue risks
  • 2FA Implementation
  • Checkpoint: OTP breach response protocol

MODULE 3: Social Engineering, Phishing & Manipulation (120 minutes)

  • Social engineering lifecycle
  • Cognitive biases exploited in scams
  • Types: Email phishing, Instagram brand collab scams, Scholarship scams, Impersonation, Sextortion, Deepfake threats
  • Scam Dissection Exercise
  • Case Study: “The Dream Opportunity”
  • Advanced Threats: AI-generated phishing
  • Checkpoint: Analytical justification of threat effectiveness

MODULE 4: Privacy, Surveillance & Digital Footprint (60 minutes)

  • Digital permanence and algorithmic amplification
  • Data brokers and reputation economy
  • Digital Exposure Audit
  • Privacy settings optimization
  • Checkpoint: Reputational risk reflection

MODULE 5: Building a Personal Security Framework (60 minutes)

  • Designing a Digital Safety Protocol
  • Password architecture plan
  • Authentication coverage map
  • Scam verification checklist
  • Social boundary rules
  • Emergency escalation plan
  • Capstone: Red Team / Blue Team Exercise

Final Outcome

Participants leave with:

  1. Structured password architecture
  2. 2FA implemented
  3. Privacy optimized
  4. Scam verification protocol
  5. Digital Safety Charter
  6. Defensive decision-making skills

Psychological Safety Layer

Trauma-informed elements:

  • Non-blaming language
  • Confidential discussion policy
  • Blackmail response protocol
  • Reporting pathways
  • Emotional resilience framing
  • Support network mapping exercise