Cyberhygiene Essentials Course Syllabus

6-Week Comprehensive Program

Modified

July 1, 2025

Course Syllabus: Cyberhygiene Essentials

Course Information

Course Title: Cyberhygiene Essentials
Duration: 6 Weeks
Level: All Levels (No technical prerequisites)
Next Start Date: July 20th, 2025
Format Options: Instructor-Led Online, Self-Paced, In-Person Workshops

Course Description

This comprehensive course provides participants with the knowledge and practical skills needed to maintain strong digital security in both personal and professional contexts. From understanding the current threat landscape to implementing effective protection measures, the curriculum focuses on building sustainable cybersecurity habits that can be maintained over time. The course balances theoretical knowledge with hands-on practice, ensuring participants can immediately apply what they learn to improve their security posture.

Prerequisites

  • Basic computer literacy (ability to use computers, smartphones, and common applications)
  • No prior cybersecurity knowledge required
  • Access to personal devices (computer/laptop and smartphone) for practice
  • Internet access for online resources and exercises
  • Willingness to make changes to current digital habits

Learning Outcomes

By the end of this course, students will be able to:

  1. Identify common cybersecurity threats and how they might affect you personally
  2. Create and manage strong authentication across your digital accounts
  3. Implement effective protection measures for all your devices
  4. Practice safe browsing, email, and social media habits
  5. Protect your personal data and maintain your privacy
  6. Develop sustainable security habits for long-term protection
  7. Respond effectively to potential security incidents
  8. Help friends, family, and colleagues improve their cybersecurity

Course Structure

Week 1: Digital Threat Landscape

Day 1-2: Understanding Today’s Threats

  • Evolution of cybersecurity threats
  • Common attack vectors:
    • Phishing and social engineering
    • Malware and ransomware
    • Data breaches and identity theft
    • Scams and fraud
  • Real-world examples and case studies
  • Threat actors and their motivations
  • Lab: Security news analysis

Day 3-5: Personal Risk Assessment

  • Identifying your digital assets
  • Understanding what attackers want
  • Personal vs. professional security concerns
  • Security myths and misconceptions
  • Psychological aspects of security
  • Developing a security mindset
  • Lab: Personal security inventory

Week 2: Password Security and Authentication

Day 1-2: Password Fundamentals

  • How passwords get compromised
  • Password cracking techniques
  • Creating strong, memorable passwords
  • Common password mistakes
  • Password reuse dangers
  • Developing a password strategy
  • Lab: Password strength assessment

Day 3-5: Authentication Tools and Techniques

  • Password manager selection and setup
  • Multi-factor authentication methods
  • Biometric authentication pros and cons
  • Account recovery options and security
  • Authentication across different platforms:
    • Email
    • Banking
    • Social media
    • Shopping
  • Lab: Password manager implementation

Week 3: Device Protection Strategies

Day 1-2: Computer Security

  • Operating system security settings
  • User account security
  • Windows/macOS/Linux security features
  • Software update management
  • Antivirus and anti-malware options
  • Disk encryption implementation
  • Lab: Computer security audit

Day 3-5: Mobile Device Security

  • Smartphone security settings
  • App permissions and management
  • iOS vs. Android security
  • Mobile malware protection
  • Lost device protections
  • Physical security considerations
  • Lab: Mobile security implementation

Week 4: Safe Browsing and Communication

Day 1-2: Browser Security

  • Browser selection and configuration
  • Security and privacy extensions
  • Cookie and tracking management
  • Safe download practices
  • Identifying malicious websites
  • Private browsing limitations
  • Lab: Browser security setup

Day 3-5: Communication Security

  • Email security best practices
  • Phishing identification techniques
  • Social media privacy settings
  • Safe messaging apps and practices
  • Public Wi-Fi dangers
  • VPN selection and usage
  • Lab: Email security audit

Week 5: Data Protection and Privacy

Day 1-2: Data Management

  • Personal data inventory
  • Data classification and value
  • Data minimization principles
  • Storage options and security
  • Backup strategy (3-2-1 rule)
  • Secure data deletion
  • Lab: Backup implementation

Day 3-5: Privacy Protection

  • Digital footprint assessment
  • Privacy settings across services
  • Location tracking management
  • Ad targeting and mitigation
  • Privacy-enhancing technologies
  • Data broker opt-outs
  • Lab: Privacy audit and cleanup

Week 6: Building Sustainable Security Habits and Capstone Project

Day 1-2: Security Habit Formation

  • Daily security routines
  • Weekly security tasks
  • Monthly security reviews
  • Security habit tracking
  • Overcoming security fatigue
  • Keeping up with security news
  • Lab: Personal security plan creation

Day 3-5: Incident Response and Capstone

  • Security incident identification
  • Response steps for common incidents
  • Data breach response
  • Recovery strategies
  • Identity theft recovery
  • Capstone project: Complete personal cybersecurity implementation
  • Final assessment and discussion

Instructional Methods

  • Interactive lectures with real-world examples
  • Hands-on labs and exercises
  • Guided implementation sessions
  • Security tool demonstrations
  • Case study analysis
  • Group discussions and knowledge sharing
  • Personal security audits
  • Reflection and habit-building activities

Assessment and Grading

Assessment Components

  1. Weekly Implementation Exercises (40%)
    • Hands-on security improvements
    • Tool setup and configuration
    • Security audit activities
  2. Security Analysis Project (20%)
    • Personal security risk assessment
    • Threat modeling
    • Prioritized security plan
  3. Progress Documentation (15%)
    • Security improvements portfolio
    • Before/after security status
    • Implementation evidence
  4. Capstone Project (20%)
    • Comprehensive security implementation
    • Documentation and reflection
    • Ongoing maintenance plan
  5. Participation and Engagement (5%)
    • Contribution to discussions
    • Peer support and collaboration
    • Q&A participation

Grading Scale

  • A: 90-100%
  • B: 80-89%
  • C: 70-79%
  • D: 60-69%
  • F: Below 60%

Required Materials

  • Personal computer (Windows, macOS, or Linux)
  • Smartphone (Android or iOS)
  • Internet access
  • Access to the course learning management system
  • Note-taking capability
  • Ability to install software on personal devices

Course Policies

Attendance and Participation

  • Instructor-led format: Attendance at live sessions is strongly encouraged
  • Self-paced format: Regular progress through course materials is expected
  • Active participation in discussions and exercises is essential for skill development

Implementation Expectations

  • Students are expected to implement security changes on their personal devices
  • All implementation is voluntary but strongly encouraged for learning
  • Alternative options will be provided when direct implementation isn’t possible

Privacy Considerations

  • Students will never be required to share sensitive personal information
  • Implementation evidence can be anonymized
  • Discussions about personal security should respect privacy boundaries

Support and Resources

  • Instructor office hours (schedule provided at course start)
  • Technical support for security tool implementation
  • Community forum for peer assistance
  • Curated list of external resources and readings
  • Recorded demonstrations and walkthroughs

Accessibility

We are committed to providing an inclusive learning environment. Students with disabilities or special needs are encouraged to contact the instructor at the beginning of the course to discuss accommodations.

Course Schedule

A detailed week-by-week schedule with specific topics, readings, exercises, and assignment due dates will be provided at the start of the course.


This syllabus is subject to change at the instructor’s discretion. All changes will be communicated to students in advance.