Creating Strong and Memorable Passwords

learn how to keep you and your family safe and secure with secure passwords!
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
0 students enrolled
40% off
Take This Course
  • Lectures 15
  • Length 40 mins
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 5/2016 English

Course Description

Do you use passwords for places like your Facebook or Email accounts? Do you worry about your password being hacked? Then this is the course for you.

Since we all started creating passwords, they were designed to be difficult for a human to guess. Being short and using random numbers and letters worked wonders. Since computing power has increased exponentially, these passwords now are not only hard for humans to remember, they're super easy for a computer to guess.

We've all been ingrained with the notion of how to create a secure password, but times have changed; and now the way you select your passwords needs to change, too. This course dives into why most passwords used today are weak, and how to make the switch to start creating passwords using two simple methods. We'll also touch on how password hints can be dangerous, how to protect your password and why those password strength meters might be lying to you!

What are the requirements?

  • Students should already be familiar with what a password is, and where they are used.

What am I going to get from this course?

  • Understand why passwords used today aren't as strong as they should be
  • Be able to create a strong password using two different methods
  • Be able to explain the two methods for creating strong passwords and how they differ
  • Be able to create strong password hints
  • Understand that passwords also need to be protected and have an idea of how to do this

Who is the target audience?

  • This course is meant to help anyone, regardless of their experience or skill level with creating a strong password. Students should have an understanding of what a password is, and where they are used.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Introduction

Welcome to the course! We talk about what to expect and the topics we'll cover.


Think you're not a target? Think again. Learn how anyone can be a target for an attacker and how your weak password could be putting your information, or your organization, at risk.

Section 2: What's So Wrong With My Password?

What exactly is wrong with the password you're using today? We explore this in this lecture.


Contrary to old wisdom, there are actually many things you should never use in a password. Chances are, you're using some of these six things right now.


Your password hint could be giving away your password without you even knowing it. Here we explore some of the pitfalls of a password hint and how to create a good password hint.

Knowledge Check
3 questions
Section 3: Using Methods to Create Passwords

In this lecture, we will explain why you should be using a method to create your passwords, rather than picking things at random. Then we'll introduce the methods we are going to cover in this course.

Section 4: The Complex Password Method

We introduce the first method, the Complex Password Method


Some examples of passwords created using the Complex Password method


Some of the advantages and disadvantages to this method that you should be aware of.

Knowledge Check
4 questions
Section 5: The Passphrase Method

We introduce the second method, the Passphrase Method.


Some examples of passwords created using the Passphrase Method.


Advantages and disadvantages of the passphrase method that you should be aware of.

Knowledge Check
4 questions
Section 6: Best Practices

A secure password isn't secure all by itself. It can still be compromised by improper storage, or typing it into a fraudulent form. In this lecture, we'll explain the importance of always maintaining proper password separation, that is, never using the same password twice. Also, we'll go over when and why you should be changing your passwords.


In this lecture, we'll discuss how to keep your passwords secure when you're not using them by storing them somewhere. We'll go over writing them down and introduce password managers.

Knowlege Check
4 questions
Section 7: Bonus Material

Believe it or not, not all strength meters are accurate! Also, attached this lecture is the bonus cheat sheet and course notes.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Think Cyber Secure, Teaching People How to Be Safe and Secure Online

Who We Are

At Think Cyber Secure, our mission is to help individuals stay safe and secure online. When we're at work, there are teams of people dedicated to watching out for us. Once at home and left to our own devices, the task can be overwhelming, especially with new technology being introduced at break neck speeds.

With the news headlines of ransomeware affecting thousands of people, passwords being stolen and other personal security risks becoming ever more frequent, the question "am I secure online?" is becoming a difficult question to answer. Let us help you!

Your Instructor

Our primary instructor, Derek, has over four years experience in both information and operational security. Not only as a consultant, but also as a researcher, he is at the forefront of many of the cyber security issues of today. He has created multiple cyber security awareness and education programs in his professional career ranging from using strong passwords, to phishing, to detecting scammers. He has also been successful in tailoring this training for many audiences, including office workers, critical infrastructure engineers and non-technical staff. All of which have been well received by many.

Ready to start learning?
Take This Course