Get up to 70% off on NordPass Premium Plans
Affiliate link — helps keep our training free.

Lesson 6: How Hackers Use Public Info (OSINT)

Hackers often gather personal info from public sources like social media, websites, or forums. This is called OSINT (Open Source Intelligence). They use it to guess passwords or create convincing scams.

Example: A hacker sees your dog’s name on Instagram and tries it as your password or security question answer.

What is OSINT used for?





Lesson 7: Safe Use of USB Drives

USB drives can carry malware if used on infected computers. Never plug in unknown USB sticks and scan all drives before opening files.

Example: You find a USB on the ground. You plug it into your computer—and malware installs silently in seconds.

What’s the danger of unknown USB drives?





Lesson 8: Recognizing Tech Support Scams

Scammers pretend to be tech support agents from Microsoft, Apple, or your ISP. They try to trick you into giving remote access or paying fake fees.

Example: You get a popup saying your computer is infected and to call a number. The person on the line demands payment to “fix” the issue.

What should you do if you see a fake tech support popup?





Lesson 9: Securing Your Home Wi-Fi

Weak Wi-Fi passwords can let neighbors—or hackers—into your network. Use a long, unique password and WPA3 or WPA2 encryption. Rename the default network name (SSID).

Example: A neighbor connects to your weak Wi-Fi password and watches your traffic or uses your internet for shady activity.

What’s the best way to secure your home Wi-Fi?





Lesson 10: What to Do After a Data Breach

If a company you use gets hacked, change your password immediately—especially if you reused it. Use a breach-checking site to see if your data was exposed.

Example: Your email is found in a leak. You reset the password and turn on 2FA, preventing anyone from logging in with the stolen info.

What’s the first thing to do after a breach?