Progress pill
Introduction

Course overview

Objective: Update your security skills !
Welcome, everyone, to this educational program dedicated to digital security. This course is designed to be accessible to everyone, so no prior knowledge of computer science is required. Our primary goal is to equip you with the knowledge and skills necessary to navigate the digital world more safely and securely.
This will involve implementing several tools, including a secure email service, a password manager, and various software to enhance online security.
This course is a collaborative effort of three of our professors:
  • Renaud Lifchitz, cybersecurity expert
  • Théo Pantamis, PhD in applied mathematics
  • Rogzy, Co-founder of Plan ₿ Academy
Your digital hygiene is crucial in an increasingly digital world. Despite the constant increase in hacking and mass surveillance, it is not too late to take the first step and protect yourself. In this course, we are not trying to make you an expert, anonymous, or invulnerable, as this is impossible. Instead, we offer you some simple and accessible solutions for everyone to start transforming your online habits and regain control of your digital sovereignty. If you are looking for more advanced skills on the subject, our resources, tutorials, or other cybersecurity courses are here for you. In the meantime, here is a brief overview of our program for the next few hours together.
Section 1: Everything you need to know about online browsing
  • Chapter 1 - Online Browsing
  • Chapter 2 - Using the Internet Securely
To begin, we will discuss the importance of selecting a web browser and its associated security implications. We will then explore the specifics of browsers, particularly regarding cookie management. We will also see how to ensure a more secure and anonymous browsing experience, using tools such as TOR. Afterwards, we will focus on the use of VPNs to enhance the protection of your data. Finally, we will end with recommendations for the secure use of WiFi connections.
Section 2: Best practices for computer usage
  • Chapter 3 - Computer usage
  • Chapter 4 - Hacking & backup management
In this section, we will cover three key areas of computer security. First, we will explore different operating systems, including Mac, PC, and Linux, highlighting their specific characteristics and strengths. Next, we will explore methods to effectively protect against hacking attempts and enhance the security of your devices. Finally, we will emphasize the importance of regularly safeguarding and backing up your data to prevent any loss or ransomware.
Section 3: Implementation of solutions
  • Chapter 6 - Email management
  • Chapter 7 - Password manager
  • Chapter 8 - Two-factor authentication
In this practical third section, we will move on to the implementation of your concrete solutions.
First, we will see how to protect your email inbox, which is essential for your communications and often targeted by hackers. Then, we will introduce you to a password manager: a practical solution to prevent forgetting or mixing up your passwords while keeping them secure. Finally, we will discuss an additional security measure, two-factor authentication, which adds an extra layer of protection to your accounts. Everything will be explained clearly and accessibly.
Ready to strengthen your digital security and take back control of your data? Let's go!