Skip to main content
Security Education Companion
A free resource for digital security educators

Welcome to the Security Education Companion! SEC is a resource for people teaching digital security to their friends and neighbors.

If you are new to digital security, want tutorials for privacy-protecting tools, or want translated guides in 11 languages, head to Surveillance Self-Defense (SSD).


Putting together a lesson plan for a digital security workshop? Check out our beginner-friendly lesson modules.

Locking Down Social Media

Duration: 1 hour


Duration: 30 minutes - 1 hour

How to Install Signal

Duration: 1 hour and 30 minutes - 2 hours

Security News

Want to stay up-to-date with security news? Check out our curated posts from EFF's Deeplinks blog.

The 5G Protocol May Still Be Vulnerable to IMSI Catchers

Og stingrayfcc 6

It’s hard to talk about the vulnerabilities in cellular technology without increasing the amount of fear, uncertainty, and doubt. There is already much uncertainty around cell-site simulators (CSS, aka Stingrays), their capabilities, and how widely they are used. Partly this is because of the veil of secrecy that has surrounded the workings of commercial cell-site simulators thanks to the widespread use of non-disclosure agreements by the manufacturing companies like Rayzone and Harris...

Read More

A Guided Tour of the Data Facebook Uses to Target Ads

Facebook eyes 1 0

Last week, Pew released the results of a survey investigating how users understand Facebook’s data collection practices and how they react when shown what the platform thinks it knows about them. The upshot is that 74% of users weren’t aware that Facebook assembles lists of their interests and traits. 88% of respondents were assigned “categories” for advertising, which could include racial or ethnic “affinities” and political leanings. 58% of those users were “not comfortable” with the...

Read More

(Don't) Return to Sender: How to Protect Yourself From Email Tracking

Email encrypted 0

Tracking is everywhere on the Internet. Over the past year, a drumbeat of tech-industry scandals has acclimated users to the sheer number of ways that personal information can be collected and leaked. As a result, it might not come as a surprise to learn that emails, too, can be vectors for tracking. Email senders can monitor who opens which emails, when, and what device they use to do it. If you work for a business or a non-profit that sends mass emails, maybe you’ve used tools to...

Read More
Close tooltip