Identity Theft Prevention and Personal Finance Security
4.1 (4 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,006 students enrolled

Identity Theft Prevention and Personal Finance Security

Learn how to secure your personal finance and personally identifiable information before it’s too late!
4.1 (4 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,006 students enrolled
Created by Roy Davis
Last updated 10/2019
Current price: $29.99 Original price: $49.99 Discount: 40% off
1 day left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1 hour on-demand video
  • 7 articles
  • 7 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • I'll show you a detailed action plan you can actually follow to make yourself more secure.
  • You'll learn identity theft defense and personal finance security.
  • How to position yourself better against forgery and fraud.
  • You'll need a computer or smartphone to do the recommended changes.
  • You'll need to be willing to take action, not just learn!
  • You'll need basic security awareness knowledge. Nothing crazy, just enough to know why you need to protect your identity and finances!

First, I want to tell you why I hate most security tips. They’re irrelevant, extreme, or tired. They are cutting out what you can’t do to be secure. The irony aside, I developed this course for you to take action, to take hope out of the equation.

Most people think they’re just fine or something else will protect them. This is very naïve way of securing your personal finances or preventing identity theft as a whole. You won’t leave your car in a shady area unlocked must because there are laws and law enforcement officers.

The course is based on a model to optimize your security efforts. If you don’t use it, you lose it. You read a good article on identity theft protection but then do nothing. You’re like “ok, now what?” What do I say when I call the phone numbers? Which websites do I go to and what do the websites look like? Which screenshots am I supposed to use? When the information isn’t directly in front of you, it’s that much harder to take action.

I think the solution to getting more people to take action is to have rich, detailed tips that have addresses, phone numbers, screenshots and everything we need. Experts say you should go to Annual Credit Report to get your free credit report to check for irregularities. Have any of you actually done that? Do you know what the website looks like and be confident that you're not going to a phishing website?

Seeing a plan with examples will generate peace of mind for you, especially if you barely know how to turn a computer on. My philosophy is to help you reduce your attack surface and to help you actively take part in security yourself without stressing you out.

Today I’ll show you real strategies that work. You won’t get in your own way with a wall of things you need to do. You’ll start off with a couple things to do immediately and graduate into other important things.

Each tip falls within a specific category and has screenshots, phone numbers, websites, and even my own recommendations.

Enrolling in this course will be like having someone close to you guiding and reminding you to be more secure and to stay focused. The premium tips here are really useful, I spent a lot of time on them. It's worth mentioning though, these tips won't make you "hackproof." Anyone who offers you absolute protection is lying to you or is a commission-based salesman.

If you don't agree and don't like the course, let me know how to improve it or use Udemy's refund feature within 30 days. We're talking low risk here. Thanks a lot for joining me.

Click the Enroll Now button to begin TODAY.

All the best,


P.S. - It's worth mentioning, however, the biggest region that would benefit from this course would be those people in the U.S. If you don't live in the U.S., I'd still love to have you in this course, but know that some of the specific recommendations involve U.S. based resources and may not be available in your country. 

P.P.S. - Oh, and one more thing. Just because you use a Mac doesn't mean you're off the hook. ;)


I believe in continuous improvement in all my courses and products! Here's the list of updates to this Identity Theft Prevention course since release:

  1. Added U.S. English captions to all videos on 4/6/2019. The auto-generated captions were bad.

  2. Added the Identity Theft Prevention and Personal Finance Security Course Slides (72 page PDF) resource to the Get Ready to Take Action lecture on 4/5/2019.

  3. Cleaned up, fixed errors, and updated FTC PDFs in the Your Incident Response and Recovery Plan lecture on 4/4/2019. These were the 5 hand crafted PDFs I created to help make the FTC's identity theft action plan portable.

  4. Updated the ID Theft Recovery Checklist (renamed XLSX spreadsheet) from the Get Ready to Take Action lecture to v1.4 on 4/4/2019.

  5. Fixed many lecture titles and descriptions on 4/3/2019.

  6. Added a new lecture on 4/1/2019.

Who this course is for:
  • Anyone who wants to go beyond basic security awareness by taking action to secure your personal finances and other personal information.
  • Those who get overwhelmed by security and want a step-by-step checklist to personal finance security.
  • U.S. based students will have the biggest benefit due to the U.S. resources listed. International students are of course welcome to join, I don't have as much familiarity with every country's processes and resources.
  • The best students will be those who are able to follow through and be able to come up with their specific action plan based on the general course plan.
Course content
Expand all 41 lectures 01:04:26
+ Introduction - Identity Theft Prevention
2 lectures 01:06

Welcome to the course!

If you've ever been confused or overwhelmed with the sheer number of tasks to do in order to be more secure, you're not alone. Many IT and Security professionals do fairly well by telling you what you should be doing, but very little actually tell you how to do it or where to go to do it.

Stick with me in this course and I'll help you organize your personal finance security efforts.

Preview 00:25

Most online courses require work to learn the material and this one is no different. This lecture serves as a call to action. You don't necessarily need to bring your A-game, but you do need to put in time and effort to complete this course. Download the ID Theft Protection Checklist that's attached to this lecture to not only get a better overview of the course, but to keep track of your progress as well.

If you want to follow along a little more closely, see the Identity Theft Prevention and Personal Finance Security Course Slides attached to this lecture as well!

Get Ready to Take Action!
+ The Planning Phase - Identity Theft Prevention
7 lectures 11:23

Before we dive into security strategies, it would be wise to reduce the amount of junk you can potentially see on a daily basis. Offers and other unwanted mailings take up more time than necessary. Besides, you don't want more information about you in the wild than there needs to be.

Preview 01:17

This task can be surprisingly therapeutic. Not only will you protect your personal information from other people, you can get the peace of mind that comes from knowing where all your sensitive information is being stored at.

Preview 01:21

Ugh, the dreaded overloaded inbox of death. Don't fret, I won't have you cleanup your inbox to attempt to reach the glorious inbox zero goal. Instead, we'll focus on something that's easier to achieve. That is reducing the incoming clutter of emails that you no longer read.

Preview 02:29

Instead of coming up with a comprehensive incident recovery plan now (yikes!), we'll look at what recovering your financial accounts and ultimately your identity looks like. Incident response will essentially be a recurring theme in this course. Get a general idea of what's involved now and then you can work on a more concrete plan later.

Your Incident Response and Recovery Plan

Here's the fun part. You get to see if online accounts registered with your email have been compromised. Hopefully you're already having fun and starting to put things together, but this part of keeping up with security information is important. You don't need to mindless slog through security research and articles. You can simply set up notifications on breaches and automate trusted news sources.

Preview 01:46

You did it! You made it to the end of the first section (not including the introduction). Before going to the Protecting Your Finances section, I highly recommend you finish these Planning Action Steps. Feel free to take your time but try to not spend more than a week on this. Keep that positive momentum going!

Planning Action Steps

In this section, we've gone over:

  1. Reducing incoming junk messages

  2. Clearing the clutter around the house

  3. Reducing incoming emails

  4. Thinking about your incident response and recovery plan

  5. Keeping up to date with security awareness and upkeep

  6. Actions steps needed to advance to the next section

Preview 02:03
+ Protecting Your Finances - Identity Theft Prevention
10 lectures 18:50

In this lecture you'll learn about the 4 major settings you should review regarding online banking:

  1. Enroll in paperless statements
  2. Sign up for MFA
  3. Schedule a recurring monthly calendar entry to review accounts
  4. Sign up for transaction alerts
Preview 00:57

Checks aren't inherently bad but they do pose risks. These old school security documents can give away more information than you bargained for. Also, if you still order them, do you check to make sure everything is ok with the shipment?

Using Checks

Credit cards may bring painful memories to those who have struggled with debt but they are an incredible security and financial automation tool. You may wish to completely replace your debit card usage after hearing a few key points in this lecture.

Using Debit Versus Credit Cards

Purchase receipts and alerts are dandy but how many of you actually check your credit card statements? Once you get into the habit, checking your statements will be lightning fast.

Credit Statement Reconciliation and Credit Monitoring

This lecture is about your credit history, and ultimately your credit score. It's something you love to hate and hate to love. We'll go over a few ways to keep up with your credit history instead of not knowing where you stand financially. Besides getting better purchase options, your security response and reaction time will be better.

Your Credit History

PayPal was the first online payment provider that I've used and even though it isn't my exclusive online payments provider anymore, I still use my PayPal account quite a bit these days. How about you? Have you had your PayPal account for a while? You may need to login and make sure everything is up to date. After all, you'll want to keep your online account and your funding options (bank account or credit card) to yourself.

Your PayPal Account

Bitcoin and other cryptocurrencies (altcoins) are great. However, you shouldn't let new fintech distract you from tried and true financial advice. Join me in this lecture to see how familiar cryptocurrency financial security advice actually is.

Cryptocurrency Overview

If you're not already in a deep sleep after thinking about taxes, you may be slow to bring urgency to filing. The key to staying cool during tax season is to be organized and file as soon as you're able to, especially before bad guys to beat you to the punch. After all, criminals won't be concerned with making sure your accounting presents fairly.

File Your Taxes Before the Crooks Do

Woohoo! You made it to the end of the second section. Before going to the Protecting Your Digital Space section, I highly recommend you finish these Protecting Your Finances Action Steps. Feel free to take your time but try to not spend more than a week on this. Keep that positive momentum going!

Protecting Your Finances Action Steps

In this section, we've gone over:

  1. Optimizing security for safe banking
  2. Using and reordering checks
  3. Using debit versus credit cards
  4. Keeping up with and reconciling your credit card statements
  5. Keeping up with your credit history
  6. Reviewing your PayPal account
  7. Overviewing cryptocurrency safety
  8. Filing your taxes before the bad guys do
  9. Action steps needed to advance to the next section
Protecting Your Finances Wrap Up and Review
+ Protecting Your Digital Space - Identity Theft Prevention
9 lectures 15:10

It is important to be careful of which websites to go to. However, you may find the source of your browsing to be a key factor. In this lecture, we'll start with the browser and move onto a few tactics on how to see if a website is legitimate.

Your Web Browsing

Back when I made my first email account in 97, I filled out all profile fields completely and accurately. And now, that information is out there in the wild. These days, however, every account has different, inaccurate information (at least when there's a choice). Besides keeping personal information private more often than not, you should also consider what you say and share on the Internet. Join me as we briefly explore this in this lecture.

Sharing Your Own Information

The online accounts that house sensitive information about you need to be locked down more than a regular fan forum account. The first and easiest control to get started with is multifactor authentication (MFA). While you're poking around your online accounts, cancel the ones you no longer use.

Your Online Accounts

We have an ever increasing number of accounts and services and old password advice isn't cutting it anymore. Password managers help lessen the burden of memorizing usernames and passwords and keep things organized for you. Find a password management solution that works best for you.

Keeping Your Passwords Organized

I like the simplicity that security journalist Brian Krebs says about your applications - If you install it, patch it. Each application installed on your computer is a potential attack vector. Most software has an autoupdate or update notifying feature. Get into the habit of keeping things up to date to stay as secure as possible.

Your Applications

If you intend to keep the files you store, you need to have them backed up somewhere, preferably in multiple, secure places. This not only protects against regular loss, but also attacks from pesky things like ransomware.

Your Files

Technical controls are dandy, but the human is quicker. Security isn't a one-and-done type of exercise. Be sure to keep that defense up! This lecture goes over the most common social engineering tactics to look out for.

Keeping that Human Defense Up

Bravo! You made it to the end of the third section. Before going to the Protecting Your Home Network section, I highly recommend you finish these Protecting Your Digital Space Action Steps. Feel free to take your time but try to not spend more than a week on this. Keep that positive momentum going!

Protecting Your Digital Space Action Steps

In this section, we've gone over:

  1. Keeping your browser and its components updated
  2. Watching what information you give away freely online
  3. Maintaining the security of your other online accounts
  4. Managing your ever increasing number of passwords
  5. Patching installed applications as updates become available
  6. Backing up and protecting the files you wish to keep
  7. Keeping your human defense up at all times
  8. Action steps needed to advance to the next section
Protecting Your Digital Space Wrap Up and Review
+ Protecting Your Home Network - Identity Theft Prevention
4 lectures 04:51

If logging into your network devices scares you, the feeling will pass. It's just a matter of familiarity. Login to you router so you can verify a few settings of your network and we'll work from there.

Jump Into Your Router

Your router can potentially have a ton of settings. Don't worry. We're NOT going to go over everything. We're just going to make sure a few settings are where they should be.

Security Settings to Check

Great work! You made it to the end of the fourth section. Before going to the Protecting Your Mobile Devices section, I highly recommend you finish these Protecting Your Home Network Action Steps. Feel free to take your time but try to not spend more than a week on this. Keep that positive momentum going!

Protecting Your Home Network Action Steps

In this section, we've gone over:

  1. Loging into your router and becoming familiar with the interface
  2. Making sure the router is up to date
  3. Verifying a few security settings are in place
  4. Action steps needed to advance to the next section
Protecting Your Home Network Wrap Up and Review
+ Protecting Your Mobile Devices - Identity Theft Prevention
3 lectures 04:07

If you're like most people, you haven't changed much in the way of settings since you first purchased and setup your phone. In this lecture, we'll revisit some old settings and make sure your use of your device is more deliberate.

Jump Into Your Phone

Nice! You made it to the end of the fifth section. Before going to the Traveling Safely section, I highly recommend you finish these Protecting Your Mobile Devices Action Steps. Feel free to take your time but try to not spend more than a week on this. Keep that positive momentum going!

Protecting Your Mobile Devices Action Steps

In this section, we've gone over:

  1. Verifying security security settings are in place
  2. Reviewing installed apps
  3. Checking out stored location data and other remote security options
  4. Action steps needed to advance to the next section
Protecting Your Mobile Devices Wrap Up and Review
+ Traveling Safely - Identity Theft Prevention
4 lectures 06:35

A little planning can go a long way to make a lot of travel worries disappear. Join me as we discuss a few things to touch up on before going on that trip.

Prep Work Before Traveling

No matter how you slice it, getting your phone stolen sucks. You probably will never be ok with it but you can reduce the impact of theft or even destruction by making sure things are backed up and having other contingencies in place.

Reducing the Pain of Having Your Phone Stolen

Right on! You made it to the end of the sixth and final section. Before doing a little celebratory dancing, you should finish these Traveling Safely Action Steps. Feel free to take your time but try to not spend more than a week on this. Finish strong!

Traveling Safely Action Steps

In this section, we've gone over:

  1. Making sure you have the appropriate peripherals
  2. Verifying proper phone settings
  3. Having all important aspects of your phone backed up
  4. Creating a basic contingency for recovering from a lost or damaged phone
  5. Action steps needed before wrapping up this section
Being Safe While Traveling Wrap Up and Review
+ Conclusion - Identity Theft Prevention
2 lectures 02:23

Thank you so much for joining me. I hope you got a lot out of this Identity Theft Prevent and Personal Finance Security course. Please let me know how things went and what else you would like to see covered. I appreciate you!

Feel free to start that celebratory dance now.

Thanks for Joining Me! What Else Can I Help You With?

A special thank you as well as upcoming content and resources.

Bonus Lecture: A Special Thank You and Additional Resources