Wondering exactly what you get when you enroll in The Bitcoin Course? Here's the complete breakdown of every video lesson, PDF summary, reference guide, and resource included in the course.
Unlike other Bitcoin courses that give you just video tutorials, The Bitcoin Course provides a complete learning system designed for different learning styles — whether you prefer watching, reading, or using reference materials.
Here's everything included with your enrollment.
Complete Video Course: 34 Lessons, 8 Hours of Training
Self-Paced, Modular Design
The course is structured so you can: watch the fundamentals first (everyone should complete this), choose your security model based on your needs, follow the specific tutorial for your chosen setup. You're not forced through irrelevant content.
Total content: 34 video lessons | 8 hours of training
Module 1: Bitcoin Wallet Fundamentals (The Essentials of Security)
6 core lessons:
- Introduction: How to Master Bitcoin Security
- Bitcoin Wallets Explained: How Do They Actually Work?
- Bitcoin Wallet Fundamentals: Seed Phrases, Keys, and Addresses
- Bitcoin Wallet Deep Dive: Structures, UTXOs, and Coin Control
- Ultimate Bitcoin Security with Hardware Wallets
- Backing up Bitcoin Wallets and Seed Phrase Security
Why this module matters
Most people skip straight to "How to set up a hardware wallet" without understanding what they're actually doing. Then when something unexpected happens — a firmware update, a recovery error, an unfamiliar setting — they panic because they never learned the fundamentals. This module ensures you understand what Bitcoin wallets actually do (and don't do), why seed phrases control everything, how private keys and addresses work, why hardware wallets are essential for security, and how to back up your wallet properly.
Module 2: Bitcoin Wallet Deep Dive (What's Inside Your Wallet)
7 detailed lessons:
- Bitcoin wallets and nodes: How they work together
- BIP39 Explained: How do seed words actually work?
- Wallet Fingerprints: How to identify your different wallets
- Bitcoin Address Types Explained: Which should you use?
- Derivation Paths: How Wallets Generate Your Bitcoin Addresses
- Bitcoin Fees Explained: Fee rates, Sats per Byte, and the Mempool
- How to get transactions confirmed fast without overpaying
Why this module matters
After this module, you'll understand how one seed phrase creates millions of addresses, why your wallet shows different addresses each time, how to choose the right address type (Legacy vs SegWit vs Taproot), how Bitcoin fees actually work, and how to optimize fees and get transactions confirmed quickly.
Module 3: Bitcoin Security Models (How to Design Your Setup)
5 strategic lessons:
- Introduction: What is a Security Model?
- Understanding Threat Modelling
- The 3 Bitcoin Security Models Explained (single-sig, passphrases, multisig)
- Which Security Model Should You Use?
- Bitcoin Passphrases Explained: Deep Dive
Why this module matters
The biggest mistake people make is overcomplicating their setup too early. This module gives you a clear decision framework for choosing security models, understanding of when simple is better than complex, threat modeling for your specific situation, and a deep dive into passphrases (when to use them, when not to).
Module 4: Building Your Ultra-Secure Bitcoin Wallet Setup
7 hands-on tutorials:
- Introduction: How to use this Chapter
- Shopping List: All The Hardware You Need
- Sparrow Wallet: Initial Download and Setup
- Coldcard Initial Configuration and Pin Setup
- Coldcard Firmware Upgrade and Verification
- Building a complete Single Signature Setup
- Building a complete Passphrased Setup
Why this module matters
This is where theory becomes practice. You'll follow along step-by-step to build a professional-grade Bitcoin security setup. Every step is explained (WHY you're doing it, not just WHAT to click), critical steps aren't skipped (firmware verification, backup testing), and you understand your setup well enough to troubleshoot.
In-Depth PDF Summaries: 17 Written Guides
Why PDF Summaries Matter
Different people learn differently: some prefer watching videos, some prefer reading and taking notes, most benefit from both. That's why the course includes 17 comprehensive PDF summaries covering every core lesson.
What PDF Summaries Include
- Written re-explanation of the video lesson
- Key concepts broken down in text format
- Important takeaways and action items
- Technical details you can reference later
How Students Use PDF Summaries
Read the summary before watching the video (preview) or after watching (reinforce). After completing the course: use as a quick reference when setting up months later, refresh specific concepts without rewatching entire videos, share written explanations with family for inheritance planning.
Written Reference Materials: Professional Guides
Beyond the video lessons and PDF summaries, you get 4 comprehensive reference guides designed for quick decision-making and ongoing reference.
1. The Bitcoin Security Model Selection Guide
What it is: A decision framework to help you choose between single-signature, passphrases, and multisig setups.
What's inside
- Complete breakdown of all 3 security models
- Pros and cons of each approach
- Decision matrix based on your holdings, tech comfort, and threat model
- When to upgrade from one model to another
Why it's valuable: Most people agonize over "which security model should I use?" for weeks. This guide walks you through the decision in under 10 minutes with clear, objective criteria.
2. The Ultra-Secure Self-Custody Checklist
What it is: A systematic, step-by-step checklist covering every aspect of Bitcoin self-custody.
What's inside
- Hardware acquisition and verification
- Device setup and configuration
- Computer and software security
- Seed phrase generation and backup
- Metal backup creation
- Recovery testing procedures
- Transaction security rules
- Operational security best practices
- Annual security audit checklist
Why it's valuable: Building a secure Bitcoin setup has dozens of steps. Miss one critical step (like firmware verification or backup testing) and you could lose everything. This checklist ensures you don't skip anything.
3. The Bitcoin Security Toolkit
What it is: A curated list of trusted tools, hardware, and software — exactly what is used for real Bitcoin.
What's inside
- Recommended hardware wallets (Coldcard Q, Mk4)
- Desktop wallet software (Sparrow Wallet)
- Mobile wallets (BlueWallet, Phoenix)
- Blockchain explorers (Mempool.space)
- Educational resources (Learn Me a Bitcoin, Mastering Bitcoin)
- Seed phrase tools (offline use only)
Plus safety notes: where to download from (official sources only), what to avoid (certain browser extensions, custodial services), how to verify downloads.
Why it's valuable: Bitcoin has hundreds of wallet options. Most are fine. Some are terrible. A few are excellent. This guide cuts through the noise and shows you exactly which tools professionals use.
4. Bitcoin Self-Custody: The Do's and Don'ts
What it is: 40+ critical rules covering what you should always do — and what you should never do — when securing Bitcoin.
Always Do
- Generate seed phrases on hardware wallets only
- Verify receiving addresses on device screen
- Test backups with recovery simulation
- Store passphrases separately from seed phrases
- Keep wallet software updated
- Use hardware wallets for cold storage
Never Do
- Type seed phrases into computers or phones
- Store seed phrases digitally (cloud, notes apps, password managers)
- Skip the recovery test
- Share seed phrases with anyone
- Reuse Bitcoin addresses
- Trust "too good to be true" schemes
Why it's valuable: Bitcoin mistakes are permanent. One wrong decision — typing your seed phrase into a website, skipping firmware verification — can cost you everything.
How The Complete System Works Together
- For Visual Learners: Watch the 34 video lessons → Build your setup following along
- For Reading Learners: Read the 17 PDF summaries → Reference during setup
- For Quick Decision-Making: Use the Security Model Selection Guide → Choose your approach in 10 minutes
- For Step-by-Step Implementation: Follow the Ultra-Secure Checklist → Ensure nothing is missed
- For Tool Selection: Reference the Bitcoin Security Toolkit → Use trusted, verified tools
- For Ongoing Safety: Keep the Do's and Don'ts Guide → Avoid critical mistakes
Together, these create a complete learning and reference system that works for different learning styles and use cases.
Lifetime Access + All Future Updates
When you enroll, you get: immediate access to all current content, all future course updates (free forever), new lessons added as Bitcoin evolves, updated materials reflecting best practices. As Bitcoin changes — new wallet software versions, updated security recommendations, new hardware wallet tutorials — you stay current. Forever.