-
Module 1.1 Introduction to Scams & Frauds
-
Definitions of Scams and Frauds
-
Common Characteristics of Scams and Frauds
-
Why Young People Are Targeted
-
Real-Life Examples
-
-
Module 1.2 Identifying Suspicious Behavior Online
-
Recognizing Unsolicited Messages
-
Requests for Personal Information
-
Too-Good-To-Be-True Offers
-
Patterns of Deceit
-
-
Module 1.3 Understanding Social Engineering
-
The Basics of Social Engineering
-
Common Social Engineering Tactics
-
Psychological Principles Behind Social Engineering
-
Protecting Yourself from Social Engineering
-
-
Module 1.4 The Role of Intuition and Gut Feeling
-
Understanding Intuition and Gut Feelings
-
The Psychology Behind Intuition
-
Practical Tips to Harness Intuition
-
Case Studies and Real-Life Examples
-
-
Module 2 Social Media Scams
-
What Are Social Media Scams?
-
How Do Social Media Scams Work?
-
Why Are Social Media Scams So Common?
-
-
Module 2.1 Common Types of Social Media Scams
-
Phishing Scams
-
Fake Giveaways
-
Identity Theft
-
-
Module 2.2 Recognizing Red Flags and Warning Signs
-
Understanding Common Red Flags
-
Analyzing Suspicious Profiles and Posts
-
Identifying Phishing Attempts
-
-
Module 2.3 The Psychology Behind Social Media Scams
-
Social Engineering
-
Fear Tactics
-
Emotional Manipulation
-
-
Module 2.4 Protecting Personal Information Online
-
Understanding the Importance of Privacy
-
Managing Privacy Settings
-
Avoiding Oversharing
-
Securing Your Accounts
-
-
Module 2.5 Practical Steps to Stay Safe on Social Media
-
Understanding Privacy Settings
-
Creating Strong Passwords
-
Recognizing and Avoiding Phishing Scams
-
Creating a Personalized Safety Plan
-
-
Module 3.1 Introduction to Sextortion
-
What is Sextortion?
-
Why Sextortion Happens More Now
-
How Sextortion Affects Kids and Teens
-
-
Module 3.2 Identifying Sextortion Tactics
-
Common Scenarios in Sextortion
-
Red Flags to Watch Out For
-
-
Module 3.3 Understanding the Impact of Sextortion
-
Emotional and Psychological Consequences
-
Psychological Manipulation Techniques
-
Social Consequences
-
-
Module 3.4 Prevention Strategies
-
Safe Online Behavior
-
Importance of Communication
-
Resources for Support and Guidance
-
-
Module 3.5 Responding to Sextortion
-
Recognizing the Situation
-
Immediate Steps to Take
-
Securing Your Digital Presence
-
Seeking Professional Help
-
-
Module 3.6 Resources and Further Learning
-
Resources United States
-
Resources Canada
-
-
Module 4.1 Introduction to Scams and Fraud in Gaming
-
The Growing Problem of Scams in Gaming
-
Common Types of Scams in Gaming
-
The Impact on Kids & Teenagers
-
-
Module 4.2 Types of Scams in Gaming
-
Phishing Scams
-
Account Takeovers
-
In-Game Item Scams
-
-
Module 4.3 Recognizing Red Flags and Warning Signs
-
Common Red Flags in Gaming Scams
-
Identifying Suspicious Activities
-
-
Module 4.4 Safe Gaming Practices
-
Account Security
-
Privacy Settings
-
Principles of Digital Citizenship
-
-
Module 4.5 Digital Citizenship and Ethical Gaming
-
Ethical Gaming Practices
-
Consequences of Digital Actions
-
Promoting a Culture of Respect and Responsibility
-
-
Module 4.6 Preventative Measures and Future Trends
-
Current Trends in Gaming Scams
-
Preventative Measures
-
Emerging Technologies and Practices
-
Future Trends and Challenges
-
-
Module 5.1 Understanding the Basics of Cybersecurity
-
Fundamental Concepts of Cybersecurity
-
Importance of Data Protection
-
Encryption and Secure Communication
-
-
Module 5.2 Common Cybersecurity Threats and Attacks
-
Understanding Malware
-
Phishing and Social Engineering
-
Insider Threats
-
Mitigation Strategies
-
-
Module 5.3 Network Security and Encryption
-
Firewalls
-
Virtual Private Networks (VPNs)
-
Encryption Protocols
-
-
Module 5.4 Cybersecurity Best Practices
-
Password Management
-
Software Updates
-
Safe Browsing Habits
-
-
Module 5.5 Legal and Ethical Aspects of Cybersecurity
-
Privacy Laws and Cybersecurity
-
Intellectual Property Rights in the Digital Age
-
Ethical Hacking Principles
-