Image 1 of 2
Image 2 of 2
Digital Self-Offense: Protect Your Tech, Protect Your Energy
January 16th, 2026 | Virtual Workshop | 1 Hour | $149 | Early bird ($129 - ends November 20th)
Course Overview
This one-hour digital safety intensive teaches you how to identify, secure, and defend your personal technology from your home Wi-Fi to your smartphone. In a world where digital intrusion is more common than ever, this course gives you the knowledge and tools to take back control of your online privacy.
Course Structure
1. Introduction: The Reality of Digital Vulnerability (10 mins)
Overview of modern digital surveillance: how it happens and who’s most at risk
Understanding metadata, location tracking, and data leaks
Simple language breakdown of terms like remote management, packet sniffing, and phone mirroring
Goal: Empower participants to recognize how and where privacy breaches occur.
2. Home Base Security - Routers & Wi-Fi Protection (15 mins)
What you’ll cover:
How to access your router’s admin panel securely
Changing default credentials (and why that matters)
Updating firmware for security patches
Disabling remote management and WPS (common vulnerability points)
Setting up guest networks and encryption (WPA3 vs WPA2)
Detecting unknown devices connected to your network
Tools/Resources:
Router security checklist PDF
Recommended network scanner apps
Goal: Ensure your home internet isn’t an open door to attackers.
3. Phone Defense - Detecting Remote Access & Forwarding (20 mins)
Key topics:
How remote management and mirroring apps get installed (often disguised as “security” or “tracking” tools)
Checking for call and text forwarding
Spotting hidden apps and system permissions
iPhone vs Android: checking management profiles and device admin access
When to do a factory reset or SIM replacement
Hands-on:
Participants follow along step-by-step on their own devices.
Goal: Recognize if your phone is compromised and take immediate recovery steps.
4. Ongoing Defense & Digital Hygiene (10 mins)
You’ll learn:
How to monitor app permissions and data access
Regular security maintenance checklist
VPN and password manager recommendations
How to secure your cloud accounts and multi-factor authentication (MFA) setup
Bonus:
Participants get a downloadable “Digital Self-Defense Toolkit” (PDF) with checklists, codes, and trusted resources.
Key Benefits
✅ Understand how hackers or stalkers can access your data
✅ Learn to secure your home network like a pro
✅ Discover hidden signs of surveillance or tracking
✅ Protect your calls, texts, and private messages
✅ Gain confidence in managing your digital environment
Digital Boundaries Disclaimer:
What you learn here is meant to empower, not alarm. This session teaches digital awareness, not digital warfare.
You are responsible for how you use the information shared — stay curious, stay ethical, and stay kind.
This course does not replace professional IT or legal support, and The Unruly Temple is not responsible for any damage or data loss resulting from personal application of the techniques discussed.
Use your new power wisely — it’s about protection, not paranoia.
January 16th, 2026 | Virtual Workshop | 1 Hour | $149 | Early bird ($129 - ends November 20th)
Course Overview
This one-hour digital safety intensive teaches you how to identify, secure, and defend your personal technology from your home Wi-Fi to your smartphone. In a world where digital intrusion is more common than ever, this course gives you the knowledge and tools to take back control of your online privacy.
Course Structure
1. Introduction: The Reality of Digital Vulnerability (10 mins)
Overview of modern digital surveillance: how it happens and who’s most at risk
Understanding metadata, location tracking, and data leaks
Simple language breakdown of terms like remote management, packet sniffing, and phone mirroring
Goal: Empower participants to recognize how and where privacy breaches occur.
2. Home Base Security - Routers & Wi-Fi Protection (15 mins)
What you’ll cover:
How to access your router’s admin panel securely
Changing default credentials (and why that matters)
Updating firmware for security patches
Disabling remote management and WPS (common vulnerability points)
Setting up guest networks and encryption (WPA3 vs WPA2)
Detecting unknown devices connected to your network
Tools/Resources:
Router security checklist PDF
Recommended network scanner apps
Goal: Ensure your home internet isn’t an open door to attackers.
3. Phone Defense - Detecting Remote Access & Forwarding (20 mins)
Key topics:
How remote management and mirroring apps get installed (often disguised as “security” or “tracking” tools)
Checking for call and text forwarding
Spotting hidden apps and system permissions
iPhone vs Android: checking management profiles and device admin access
When to do a factory reset or SIM replacement
Hands-on:
Participants follow along step-by-step on their own devices.
Goal: Recognize if your phone is compromised and take immediate recovery steps.
4. Ongoing Defense & Digital Hygiene (10 mins)
You’ll learn:
How to monitor app permissions and data access
Regular security maintenance checklist
VPN and password manager recommendations
How to secure your cloud accounts and multi-factor authentication (MFA) setup
Bonus:
Participants get a downloadable “Digital Self-Defense Toolkit” (PDF) with checklists, codes, and trusted resources.
Key Benefits
✅ Understand how hackers or stalkers can access your data
✅ Learn to secure your home network like a pro
✅ Discover hidden signs of surveillance or tracking
✅ Protect your calls, texts, and private messages
✅ Gain confidence in managing your digital environment
Digital Boundaries Disclaimer:
What you learn here is meant to empower, not alarm. This session teaches digital awareness, not digital warfare.
You are responsible for how you use the information shared — stay curious, stay ethical, and stay kind.
This course does not replace professional IT or legal support, and The Unruly Temple is not responsible for any damage or data loss resulting from personal application of the techniques discussed.
Use your new power wisely — it’s about protection, not paranoia.