Real-World Relevance
Understand how scams actually occur and why they are effective. This course focuses on real-world patterns and examples to help you recognize potential threats in everyday situations.
Actionable Strategies
Learn practical steps you can take to protect your information, reduce your digital footprint, and respond appropriately when something doesn’t seem right.
Flexible Format
Learn at your own pace, on your own schedule. This training is entirely self-guided and accessible online, so you can build your knowledge when and where it works best for you.
About the Course
This course provides an overview of digital identity protection and awareness, with a focus on how scams work, how personal information is used, and steps you can take to reduce your risk. You’ll explore how your digital footprint is created, how scammers access and use information, and how to recognize common scam types and warning signs. Throughout the course, you’ll learn practical strategies to better protect your information and respond appropriately when something doesn’t seem right. This training is presented in spoken English and is interpreted into ASL. The presenter uses high-contrast slides and captions are available.
Course Curriculum
-
1
Start Here
-
(Included in full purchase)
Please Read Before Beginning
-
(Included in full purchase)
-
2
Course Introduction
-
(Included in full purchase)
Overview & Instructor Introduction
-
(Included in full purchase)
Digital Identity Protection and Awareness Handout
-
(Included in full purchase)
-
3
The Modern Scam Landscape
-
(Included in full purchase)
The Modern Scam Landscape
-
(Included in full purchase)
Knowledge Check
-
(Included in full purchase)
-
4
What Shapes Your Digital Footprint
-
(Included in full purchase)
What Shapes Your Digital Footprint
-
(Included in full purchase)
Knowledge Check
-
(Included in full purchase)
-
5
What Makes Up a Digital Footprint
-
(Included in full purchase)
What Makes Up a Digital Footprint
-
(Included in full purchase)
Knowledge Check
-
(Included in full purchase)
-
6
Best Practices for Protecting Your Information
-
(Included in full purchase)
Best Practices for Protecting Your Information
-
(Included in full purchase)
Knowledge Check
-
(Included in full purchase)
-
7
Social Media Risks & How to Protect Yourself
-
(Included in full purchase)
Social Media Risks & How to Protect Yourself
-
(Included in full purchase)
Knowledge Check
-
(Included in full purchase)
-
8
How Scammers Get Your Information
-
(Included in full purchase)
How Scammers Get Your Information
-
(Included in full purchase)
-
9
Types of Scams & Warning Signs
-
(Included in full purchase)
Types of Scams & Warning Signs
-
(Included in full purchase)
Knowledge Check
-
(Included in full purchase)
-
10
Best Practices on Avoiding Scams
-
(Included in full purchase)
Best Practices on Avoiding Scams
-
(Included in full purchase)
Knowledge Check
-
(Included in full purchase)
-
11
RID CEU Request Form & Evaluation
-
(Included in full purchase)
RID CEU and/or Certificate Request Form
-
(Included in full purchase)
Evaluation
-
(Included in full purchase)
About the Presenter
Over the last ten years, Lauren Carr has delivered training across various audiences addressing digital awareness and online security, advising on open-source information and social media risks such as exploitation, identity thieves, hackers, and scams. Her professional experience includes supporting government, military, law enforcement, and their families in managing their digital footprints to avoid unwanted exposures and mitigate risks. Lauren is a graduate of the University of North Carolina at Chapel Hill, holding a degree in Peace, War, and Defense, and holds a master's in Applied Intelligence from Mercyhurst University.
Approved for RID CEUs
This course has been approved for RID CEUs! Vancro Integrated Interpreting Services (VIIS) is an approved RID CMP sponsor for continuing education activities. This workshop is offered for .1 CEUs in the General Studies area at the “little to no” content knowledge level. Participants who wish to receive RID CEUs must provide their RID member number when prompted. CEUs will be reported to RID by VIIS. Important Note for Non-RID CEUs: If you are seeking CEUs for an organization other than RID (for example, BEI or another certification body), VIIS will not report those on your behalf. You may use the certificate of attendance you receive to request CEUs directly from your certifying organization. VIIS is committed to offering educational opportunities free from discrimination and bias. For accommodation requests or questions, please contact: [email protected]
What You'll Learn
Objective #1
Gain a comprehensive understanding of an individual's digital signature and how adversaries utilize this information to steal, hack, and exploit for financial or personal gain
Objective #2
Learn multiple mitigation tools and best practices for protecting information and how to report if exploited
Objective #3
Understand five reasons why scams are so effective and four ways scammers access your information
Ready to Better Protect Your Information?
Build awareness of how scams work and take practical steps to reduce your risk. Enroll now to strengthen your understanding of digital identity and make more informed decisions about your personal information.