Digitification — Computer Literacy Hub | Global Sovereign University
GSU Learning Center — Computer Literacy

Digitification
The Computer Literacy Hub

Most programs teach kids to use computers. We teach them to defend themselves while doing it. Cybersecurity is not a separate lesson. It is the foundation of every lesson.

19
Modules
194
Hours
3
Bands
$0
Cost
🛡️

Security-First. Not Security-Last.

Most K–8 computer classes treat cybersecurity as an afterthought — a single unit wedged between typing drills and slideshow projects. Digitification reverses that architecture. Every band, every module, every skill is taught with digital defense woven into the fabric.

🔑
Band 1
Password discipline. Fake login page recognition. Digital footprint awareness from day one.
🎣
Band 2
Phishing detection. Privacy engineering. App permission auditing. Information verification.
🧬
Band 3
Network security. Social engineering defense. Deepfake detection. Personal threat modeling.
🖥️
Band 1 — Grades 4–5

Digital Foundations

6 Modules
54 Hours
Badges: Bronze → Silver

The starting line. Students build the physical and cognitive skills to operate a computer with confidence — and the situational awareness to recognize when something is not right.

DF-101
BRONZE
⌨️
Keyboard Command
Touch typing fundamentals, 25+ WPM target, essential keyboard shortcuts. The hands learn before the mind wanders.
12 hours
DF-102
BRONZE
📁
File Architecture
Folder structures, naming conventions, file types, local vs. cloud storage. Where things live and why it matters.
8 hours
DF-103
BRONZE
🌐
Digital Citizenship 101
Online identity, digital footprint, cyberbullying recognition, screen time awareness. Your first lesson in owning your digital self.
10 hours
🛡️ SECURITY WOVEN
DF-104
BRONZE
🔍
Internet Navigation
Browsers, search engines, evaluating sources, distinguishing ads from content. The internet is not a library — it is an obstacle course.
8 hours
DF-105
SILVER
🏰
Password Fortress
Strong password creation, password managers, recognizing fake login pages. Your first line of defense — built before anything else.
6 hours
🛡️ SECURITY WOVEN
DF-106
BRONZE
📝
My First Documents
Google Docs and Word basics — formatting, headings, sharing, collaboration. Building the first artifact for the Living Portfolio.
10 hours
Band 2 — Grades 6–7

Digital Operators

7 Modules
72 Hours
Badges: Silver → Gold

The threat landscape opens up. Students move from basic operations to active defense — learning to detect phishing, audit their own privacy, verify information, and use productivity tools like professionals.

DO-201
SILVER
🚀
Keyboard Mastery
40+ WPM target, advanced shortcuts, efficiency workflows. Speed is a skill. Efficiency is a weapon.
10 hours
DO-202
SILVER
🎣
Threat Detection
Phishing emails, social engineering tactics, malware recognition, reporting protocols. Learning to see the hook before you bite.
12 hours
🛡️ SECURITY WOVEN
DO-203
SILVER
👁️
Privacy Engineering
App permissions, location tracking, data collection practices, privacy settings audit. Understanding who is watching and how to close the blinds.
10 hours
🛡️ SECURITY WOVEN
DO-204
SILVER
📊
Productivity Suite
Docs, Sheets, and Slides in depth — formulas, data organization, real-time collaboration. Tools that earn their place in the portfolio.
14 hours
DO-205
SILVER
✉️
Email & Communication
Professional email structure, etiquette, spam identification, attachment safety. Write like an adult. Spot danger like a professional.
8 hours
🛡️ SECURITY WOVEN
DO-206
GOLD
🔬
Information Verification
Fact-checking methods, reverse image search, AI-generated content detection. In an age of synthetic media, verification is survival.
10 hours
🛡️ SECURITY WOVEN
DO-207
GOLD
🪞
Digital Identity Audit
Google yourself. Clean your footprint. Audit your reputation. Learn to manage the version of you that exists online — before someone else does.
8 hours
🛡️ SECURITY WOVEN
🔥
Band 3 — Grade 8

Digital Defenders

6 Modules
68 Hours
Badges: Gold → Platinum

The capstone year. Students build a functional threat model for their own digital lives, learn to govern AI rather than be governed by it, and produce a Living Portfolio that proves what they can do — not what they memorized.

DD-301
GOLD
🔐
Cybersecurity Fundamentals
Networks, encryption, VPNs, two-factor authentication, software updates. Understanding the infrastructure you depend on — and how it breaks.
14 hours
🛡️ SECURITY CORE
DD-302
GOLD
🎭
Social Engineering Defense
Manipulation tactics, deepfake identification, AI-generated scams, personal threat modeling. The most dangerous attacks do not target your computer. They target your judgment.
10 hours
🛡️ SECURITY CORE
DD-303
GOLD
📜
Data Sovereignty
Who owns your data. How it is monetized. COPPA protections. Opt-out procedures. Encrypted messaging. Your data is currency — learn who is spending it.
10 hours
🛡️ SECURITY CORE
DD-304
PLATINUM
🤖
AI Literacy
What AI can and cannot do. How chatbots work. GSU's Four Guardrails for AI governance. AI content detection. Ethics of synthetic creation. Govern the machine — do not let it govern you.
12 hours
🛡️ SECURITY CORE
DD-305
GOLD
🔧
Troubleshooting Protocol
Systematic problem-solving, reading error messages, backup strategies, when to ask for help and when to figure it out. The diagnostic mindset — applied to machines.
8 hours
DD-306
PLATINUM
🏆
Digital Living Portfolio
The capstone. Document every skill, every project, every badge. Conduct a full personal security audit. Build the credential that proves what you can do — not where you sat.
14 hours
🛡️ CAPSTONE

Badge Progression

No letter grades. No GPAs. Badges are earned through demonstrated capability — not attendance, not compliance, not a number on a curve. Each badge is proof you can do the thing, not proof you sat through the lecture about the thing.

🥉
BRONZE
Core skills demonstrated.
Foundation established.
🥈
SILVER
Applied under pressure.
Security awareness active.
🥇
GOLD
Cross-domain integration.
Threat modeling operational.
💎
PLATINUM
Capstone complete.
Living Portfolio published.

Four Ways to Deploy

The curriculum adapts to any environment. Choose the model that fits — or combine them.

🏠
Homeschool Track
Self-paced with parent or mentor oversight. GENO AI tutor provides comprehension support in 32 languages. Badge progress tracked by the learner. Freedom with structure.
🕐
After-School Program
Two sessions per week, 90 minutes each. Civilization Builder mentors lead hands-on labs. Real equipment, real scenarios, real feedback. Not a babysitting service — a capability factory.
📚
Community Learning Center
Open lab at libraries or Elks Clubs. Drop-in hours. Monthly skill showcases where learners demonstrate progress to the community. Education as a public event.
🏫
School Partnership
Supplements existing computer classes. Badge system runs parallel to traditional grades — giving students a credential that shows what they built, not just what they scored.

What Makes Digitification Sovereign

Four principles that separate this curriculum from every computer class that came before it.

🛡️
Security-First
Cybersecurity is not a unit. It is the architecture. Every module in every band includes digital defense — from password discipline in 4th grade to threat modeling in 8th.
🏆
Proof Over Grades
Badges are earned through demonstrated capability. The Living Portfolio is the credential — not a letter on a report card, not a percentage on a test nobody remembers.
🧑‍🏫
Human + AI Mentors
GENO provides AI tutoring in 32 languages. Civilization Builders provide the judgment, stories, and real-world experience that no algorithm can replicate.
💰
Free. Permanently.
No tuition. No subscriptions. No paywalls. No hidden fees. Global Sovereign University is a 501(c)(3). Education is the mission — not the product.

Build the Digital Defender
the World Needs

19 modules. 194 hours. Zero cost. By 8th grade, your learner has a functional threat model, a Living Portfolio, and the skills to navigate a digital world that most adults still do not understand.

GENO

GENO

GSU Education Guide • AI Powered

Ask me anything about GSU