Note: I don’t know if I’ll do this, but it is something that I am passionate about and have a lot of experience with. The outline also still needs some tweaking.

Introduction to Online Safety and Privacy

Course Overview

  • Target Audience: General public without technical backgrounds
  • Duration: 3 hours total (2h 40-45m content delivery, 15-20m break)
  • Objective: Equip participants with skills and knowledge to stay safe and protect their privacy online
  • Format: In-person interactive lecture, discussion, demonstrations, and Q&A

Course Outline

Hour 1: Foundations of Online Safety and Privacy (90 min)

  • 10 min: Welcome and Introduction
    • Overview of course objectives
    • Importance of online safety and privacy in daily life
  • 25 min: Defining Key Terms
    • Personal data: Names, emails, addresses, phones, browsing habits
    • Threats: Phishing, malware, identity theft, social engineering, scams
    • Tools: Encryption, HTTPS, two-factor authentication (2FA), VPN
    • Data breach vs. data leak
    • Interactive exercise: Match terms to definitions on handouts
  • 15 min: What Are My Risks?
    • Simple explanation: How do I identify my risks?
    • Questions: Who might want my data? What could they do? How can I reduce risks?
    • Example: Google Yourself
    • Example: 2-3 min Kitboga video clip (e.g., scam call)
    • Quick activity: Write one online habit and one potential risk
  • 15 min: Common Cybercrime and Privacy Threats
    • Overview: Phishing emails, malicious apps, scams
    • Real-world examples: Fake login pages, text scams (show sample on slide)
    • How attackers target you
  • 10 min: Q&A and Interactive Poll
    • Quick quiz: Identify phishing email or key term
    • Open discussion on participants’ experiences

Break (15-20 min, ~90 min into course)

  • Time for personal needs, refreshments, or informal questions

Hour 2: What can I do about it? (80 min)

  • 15 min: Strong Passwords and Authentication
    • Creating strong, unique passwords
    • Using password managers (e.g., KeepassXC, Bitwarden)
    • Setting up two-factor authentication (2FA)
    • Example: Shoe HaveIBeenPwned for compromised accounts
  • 15 min: Safe Browsing and App Usage
    • Recognizing secure websites (HTTPS, lock icon)
    • Avoiding suspicious downloads, pop-ups, links
    • Checking app permissions on smartphones
    • VPNs, Tor, etc.
  • 15 min: Social Media and Privacy Settings
    • Adjusting privacy settings (e.g., Facebook, Instagram)
    • Risks of oversharing personal information or kids’ info
    • Avoiding social engineering tactics
  • 10 min: What Happens When Your data Is Compromised
    • Why it happens: Breaches at employers, banks, websites, etc.
    • It’s often not your fault, but you do have options
    • Actions: Check HaveIBeenPwned, freeze credit, change passwords, report to FTC
  • 15 min: Hands-On Activity
    • Walkthrough: Setting up 2FA on a sample account (hardware key or app-based like Google Authenticator)
    • Demo: Reviewing privacy settings on Facebook (handouts for X, Snapchat)

Final Segment: Staying Safe Long-Term and Wrap-Up (30 min)

  • 15 min: Staying Informed and Vigilant
    • Keeping software/devices updated
    • Recognizing new scams (e.g., AI-generated fraud)
    • Trusted resources (e.g., FTC, StaySafeOnline.org)
    • Scenario discussion: Analyze suspicious text scenario
  • 10 min: Wrap-Up and Final Q&A
    • Recap key takeaways
    • Handout: Safety checklist and glossary
    • Encourage sharing one action participants will take
  • 5 min: Closing
    • Thank participants, provide resource links, invite feedback