Topic outline

  • General

    • Note: Please ensure the full name set in your Moodle profile is what you wish to be displayed on the certificate before you complete the course.

  • Threat modeling

    • A threat model is a list of the most probable threats to your security and privacy endeavors. In this short guide we'll cover the questions you'll need to ask to create this list.

    • Check your understanding of the topics we've discussed so far, and see if you can apply them to a real-world scenario.

  • Common things to consider

    • These are some common threats people face when they're thinking about defending their privacy and security. You may be concerned with none, one, a few, or all of these possibilities, and the plan you make depends on what your individual goals are.

    • Check your understanding of the common threats we've identified in this lesson, and the impact they could have on your privacy.

    • There's a lot of advice floating around the privacy and security space, but how much of it is true? Watch out for these potential pitfalls when you're evaluating claims!

    • Check your understanding of the common misconceptions we just covered, and see if you've encountered any of this advice before.

  • Put your skills to work!

    • Once you've finished this course, use the skills we've talked about to create your own personalized guide about something you want to protect.