How to create strong, unique passwords
Benefits of password managers
How to activate and use 2FA (two-factor authentication)
How to recognize phishing and fake email
Simple ways to verify legitimacy
What to do if you think you’ve been targeted
What cybersecurity is and why it matters
Basic rules for using devices and the internet safely
How to protect personal and work-related information