• calendarApprox Completion Time 1 day
  • clockValidityLifetime access
  • computerCourse FormatRecorded + Live
  • certificateIncludesCertificate
  • workContent 00:39 Hours Videos
    1 Lessons

Top Online Course in India

course report

Our Course Stats

Students who got positive growth in their careers after course completion


TeacherDada learners see an average salary hike after course completion


Students who started a new career or changed job after course completion



How to use Digital Locker in this Cyber World

The students breathed a sigh of relief after the long wait for their results. This made their parents busy with arranging all the required documents in proper order and keeping them safe for the admissions process. The students were excited and overwhelmed to take admissions to their dream colleges and universities.

Sign up for the Digital Locker portal, https://digilocker.gov.in/, and its smartphone app using your username and password. I had been using Digital Locker since the year 2017 and I was really satisfied with its service. I also explained to my uncle the simple 5-step process of opening the Digital Locker account.

Following are the step by step guides which one must follow to open a Digital Locker account:

1. Visit the Digital Locker website and click on the Sign-Up with your email id or you can download the Digital Locker app too

2.   Enter your 12-digit Aadhaar number

3.   OTP will be sent to your mobile number

4.   Enter the OTP and select validate OTP (One Time Password)

5.   Once your OTP is successfully validated, your Digital Locker Registration process is successful

Now all the states have started recognizing Digital Locker. There are numerous benefits of having a Digital Locker account such as Citizens can access their digital documents anytime and share them online for their ease and convenience.

It lessens the governmental overhead of government offices by limiting the usage of paper, empowers computerized strengthening of occupants, guarantees the validity of the e-archives, and along these lines wiping out the use of phony reports, guarantee protection and approved admittance to inhabitants' information and a lot more advantages that residents can appreciate. Many more benefits can be found with a Digital Locker account.

It also helps in keeping other important documents safe such as a driving license, voter ID, PAN card, and Aadhar card.

Digital Locker is a key initiative under Digital India corporation, the Indian Government’s flagship program aimed at transforming India into a digitally empowered society and knowledge economy. Digital Locker ties into Digital India’s vision areas of providing citizens a shareable private space on a public cloud and making all documents/certificates available on this cloud.

Targeted at the idea of paperless governance, Digital Locker is a platform for issuance and verification of documents & certificates digitally, thus removing the use of physical documents. Indian citizens who sign up for a Digital Locker account get a dedicated cloud storage space that is linked to their Aadhaar (UIDAI) number.

Organizations that are registered with Digital Locker can push electronic copies of documents and certificates (e.g. driving license, Voter ID, School certificates) directly into citizens’ lockers. Citizens can also upload scanned copies of their legacy documents to their accounts. These legacy documents can be electronically signed using the e-Sign facility.

The platform has the following benefits:

Citizens can access their digital documents anytime, anywhere, and share them online. This is both useful and time-saving.

It reduces the administrative overhead of Government departments by minimizing the use of paper.

Digital Locker makes it easier to validate the integrity of documents as they are issued directly by the registered issuers.

Self-uploaded documents can be digitally signed using the e-Sign facility (which is similar to the process of declaration).

The following are the key stakeholders in the Digital Locker system:

Issuer: Entity issuing e-documents to individuals in a standard format and making them electronically available e.g. CBSE, Registrar Office, Income Tax department, etc.

Requester: Entity requesting secure access to a particular e-document stored within an archive (e.g. University, Passport Office, Regional Transport Office, etc.)

Resident: An individual who uses the Digital Locker service based on the Aadhaar number.

The main technology components of the Digital Locker system are:

Source: Collection of e-documents that are exposed via standard APIs for secure, real-time access.

Requesters can obtain e-documents from numerous sources in real-time utilizing the Access Gateway, which is a secure online system (Uniform Resource Indicator).

Digital Locker Portal: Dedicated cloud-based personal storage space, linked to each resident’s Aadhaar for storing e-documents, or URIs of e-documents.

Benefits of Digital Locker

Customers gain cost savings, the elimination of policy copy non-delivery problems, faster insurance service response times, faster claims processing and payment, fewer disputes and frauds, and so on.

Some of the other benefits are:

One can save important documents anytime and from anywhere.

One can authenticate documents, legally on a par with originals.

One can easily share documents with others.

Faster service delivery - Government benefits, employment, financial inclusion, education, health.

Reduced administrative overhead: The process reduces the administrative overhead by minimizing the use of paper and curtailing the verification process.

Secure document gateway: It acts as a secure document exchange platform like a payment gateway between the trusted issuer and trusted Requester/Verifier with the consent of the citizen.

Other courses by me

Basic Requirement

  • Should be aware of how to access the internet. Should have an Aadhar-card.

Skills Covered

  • Kids will learn about the concept of Locker and Digital Locker

  • Benefits of Digital Lockers

Expert Review

Cybersecurity Tips For Students At Home And At School

1. Protect your social media accounts 

Facebook, Instagram, and Twitter provide fun and engaging ways to communicate with parents and students. To keep your students' privacy protected, you'll need to review the privacy settings of each account. Learn which platform can see what data and with whom it shares it. Here are some examples:


Make sure your classroom Twitter account is set to 'protected' so that only people you follow can see your tweets. 


In the privacy control settings, select 'Friends only'.  

Blur the faces of students:

 By using a student or parent's image in your posts, you could potentially be violating their privacy rights. You can use a free app to blur your students' faces and any other information that might reveal their identity.

2. Use tools, apps, and websites that encrypt data

The encryption process secures and protects any data you send online from hackers, network snoopers, and third parties.

Use encrypted websites:

You should only visit websites that begin with 'https' and have a padlock icon next to them. 'S' stands for 'secure' (encrypted), which means that any data obtained by unauthorized parties is useless. 

Apps with privacy policies: 

IOS apps require all users to communicate via https, but Android apps cannot guarantee the same. You should either check the privacy policies of each tool or inspect the website for an official seal from a data protection organization. 

For example, Class Time has signed the California Student Privacy Alliance agreement. Apps and websites covered by COPPA (Children's Online Privacy Protection Act) have already implemented strict data security measures.

3. Develop a plan for recovery

Informing parents:

Errors happen. Your photo on social media might have accidentally captured a student's name or address, or there might have been a widespread breach of sensitive information. Please let the parents know whether they'll be notified by post or email, and who will do so: will it be a member of the IT department or another senior staff member?

What are your plans? Outline the steps that will be taken if a data breach occurs. Are students enrolled in an identity theft service? Are you willing to assist students in securing their accounts and changing their passwords in the aftermath (see step 5)? A school, district, or student can request that their data be deleted from the company's servers in the event of a data breach. There are many different kinds of privacy breaches.     

4. Connect to a VPN

Any educational task requiring access to the institution's network should require a private VPN connection. Your students' internet traffic is encrypted and therefore protected from interceptors who may wish to steal their passwords.

On public Wi-Fi:

The public Wi-Fi network is unsecured, which makes it a hotbed for hackers. Secure public Wi-Fi with a VPN by encrypting your connection. Remote students can work from home, coffee shops, or their dorm room without worrying about hackers intercepting their data.      

5. Strong and unique passwords are a must

Cybercriminals sell millions of stolen usernames and passwords on the dark web. Students' sensitive information can be exposed by weak passwords, which can be guessed or cracked in milliseconds. You can use a password manager to create uncrackable passwords and auto-fill them whenever you need them. NordPass, for instance, stores credentials in an encrypted vault that can only be accessed by you. Visit NordPass Password Manager to learn more.

Creating a Secure Password

Students should create passwords that are long, complex, and mixed. The passwords should be at least 8 characters long, contain a mix of letters, numbers, and special characters, and be as nonsensical as possible. During a brute-force attack, hackers try combinations of millions of dictionary words and numbers per second until one succeeds.    

6. Be aware of phishing scams

Targeting schools and universities: Student databases are a goldmine of personal information about students. The purpose of a phishing scam is to trick your staff into interacting with a bogus email or text message in order to spread malware, steal credentials, or worse. Students' emails have been used by cybercriminals to apply for fraudulent loans, steal identity information, and infect entire networks, causing them to crash.   


Phishing emails are usually spotted by reading the sender's address. A website URL such as www.csac.ca.gov for the California Student Aid Commission might appear as www.csac.ca.com, and no one would be the wiser. Send a separate email to the authority in question and ask students not to click on links within COVID-19-themed emails. Maintain vigilance.       

7. Understand the terms and conditions

Be aware of the terms and conditions you agree to by downloading and/or using an app when you join a site, become a member of a social media site, or download an app. A scanning app that shares your face data with your name, browsing history, contact information, and more, for example, could pose a significant security risk to you in the future.

8. Don't share your personal information

Obviously, this one bears repeating: Don't share your personal information - or at least be aware of who might read (or end up finding out) about what. If someone knows your email address with a weak password or your full name and address, they can easily create a threat to your identity, financial security, and more.

As a result, it is unsafe to share accounts, such as Netflix accounts, with friends.

Tips for students and schools on data security

9. Update apps and operating systems on devices

10. Make (secure) backups of important files or databases

11. Don't use unsecured WiFi networks

12. Understand your context and network (physical and digital)

Schools: Educate staff about school and district policies. Students: Know your specific risks and vulnerabilities (based on your usage, age, career goals, etc.).


Having strong passwords is the first step in protecting your personal information from cyber theft. Any teacher can offer his or her students this simple advice on how to begin. Consider an encrypted password manager like NordPass, created by the cybersecurity experts behind NordVPN. Make sure your students are 100% safe by reading these testimonials.

Get Certified

You will receive an industry-recognized Certification from TeacherDada after completing the course. You can also share your Certificate in the Certifications section of your LinkedIn profile, CVs, resumes, and other documents.

sample_certificate For sample view only

Course creator

                                 Deepti Lele