Free Online Privacy Training 101
  • Online Privacy Training
  • About this online privacy training course
  • Contents
  • Introduction
    • Disclaimer
  • Modules
    • 1. Online Privacy: an introduction
      • Lesson 1: Understanding the Digital Landscape
      • Lesson 2: Privacy Policies & User Agreements
    • 2. Privacy Basics and Background
      • Lesson 1: The Public You vs. The Private You
      • Lesson 2: Dissecting Your Digital Footprint: Data and Metadata
      • Lesson 3: Tracking (Cookies, Link Tracking and Data Aggregation)
        • Part 1: Cookies
        • Part 2: Link Tracking
        • Part 3: Data Aggregation
      • Lesson 4: Proprietary vs. Open Source
    • 3. Privacy Architecture
      • Lesson 1: Privacy Architecture
      • Lesson 2: Operating System Layer
      • Lesson 3: Networking Layer
      • Lesson 4: Application Layer and Above
      • Privacy Architecture Summary
    • 4. Private Messaging with Signal Messenger
    • 5. Private Browsing
    • 6. Data Encryption, User Name and Password Management
      • Lesson 1: User Name and Password Best Practices
      • Lesson 2: USB Disk Encryption
      • Lesson 3: Password Management with KeePassX
    • 7. Virtual Private Networks (VPNs)
    • 8. Private Email
    • Summary
Powered by GitBook
On this page

Was this helpful?

  1. Modules

2. Privacy Basics and Background

Covers online privacy, Internet privacy, data security threats, Virtual Private Networks (VPNs), anonymous browsing, data threats, personal data

Learning objective: Explore four areas in which your online privacy can be compromised.

In Module 1 we introduced you to what online privacy is and why it matters. In Module 2, we explore four basic topics related to online privacy:

  • Public vs. Private Profile

  • Data and Metadata

  • Tracking (Cookies, Link Tracking and Data Sharing)

  • Open Source vs. Proprietary Technology

Also in Module 2, we’ll start to tackle some of the easiest steps you can take to reduce data leakage that can occur through some of the most commonly-used devices and applications. So let’s get into it!

PreviousLesson 2: Privacy Policies & User AgreementsNextLesson 1: The Public You vs. The Private You

Last updated 1 year ago

Was this helpful?