Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Selling online courses securely

in Blog, Document Security, DRM, PDF Security

How to sell online courses securely – stop sharing, editing, copying & printing

When elearning courses are delivered or sold outside a controlled classroom environment you need a secure DRM system in place to protect online courses and course content from theft, unauthorized sharing and distribution.

  How to sell online courses securely & prevent sharing


In today’s commercial landscape, delivering many things, including digital training course materials and elearning courses, must now be done at a distance, in an environment that is not under your control, but rather out of control.  Selling online courses and getting paid for them is equally important, as is making sure you don’t find copies on download, social media, and other Internet sharing sites.  And when you are selling online courses or coursework that is made up of digital documents (and therefore easily copied and distributed) you need a Digital Rights Management (DRM) system that was designed to work regardless of the infrastructure they are used in.

Traditionally, training courses would be taught in a controlled environment with students given access to a company’s computer systems and devices.  With remote learning, students use their own devices (be that a computer or mobile device) enabling content to be easily shared with others since it is now under their control instead of yours.  Locklizard’s DRM for training course content ensures that e-learning materials are always under your control and cannot be easily shared with unauthorized users.

Protecting online courses and course content from theft & illegal distribution


What problems do you need to solve to be successful?

  1. You want to sell online courses to people that you do not know (apart from a valid credit card?) the right to use elearning and digital training courses while not being able to rip you off (sharing a course or course content with others).
  2. Providing control over your course content whilst it is outside your network – most probably you would want to keep strangers out of your networks as much as possible in case they compromise the security of it in some way, such as inadvertently having been given access to the wrong areas.
  3. Preventing users from sharing logins to online courses.
  4. Making sure protection measures cannot be easily bypassed.
  5. Stopping PDF scraping of your course content for use in training AI models.

Protection of course content in hostile environments


When you are selling online courses or trying to sell notes online you need to make sure the controls of the copying and piracy protection you’re using work in hostile environments.  And surviving an intermittent Internet service.  Not everywhere has fiber to the doorway and in some places copper is removed by local ‘entrepreneurs’ just as fast as it can be installed.

So what characteristics do you need to have in your elearning course protection system to help you sell to and reach the largest market with the lowest risk?

Secure courseware eDelivery – the devil is in the domain


As we have already noted your elearning content protection solution must be able to bypass or ignore domain boundaries.  These are introduced by corporate bodies to replace the earlier firewall physical boundary with a logical one.  But introducing two domains to each other is a non-trivial undertaking so you can’t really expect to use a ‘standard’ Single Sign-On to control user access because it has domain boundaries.  And ever so many of your customers are in no domain at all, or in a domain that is not going to join your domain anytime soon.

Domain bound systems suit corporate bodies that can undertake IRM (Information Rights Management) rather than DRM approaches because they control everything within the domain including known users (employees or trusted third parties) of the system.  So they can define relationships and hierarchies and automate the ability to define what is confidential and what is sensitive and the internal protection rules that should apply.  But not everyone agrees as to what the levels of trust correspond to what level of control.  You have to have the ability to define what you want rather than what they support.

Stopping sharing of elearning courses and course content


Online courses are often accessed via a browser with user’s logging in to a portal.  However there is no easy way to prevent users sharing login information even if 2FA is being used (they can share that as well).  Some systems provide tracking information, but that is pretty useless since users can use a proxy to share the same IP address with others.

Trying to prevent course material being copied or printed in a browser environment is also an uphill task.  The only way you can achieve this is using JavaScript which can be edited or removed in the browser environment.  For an example of how insecure JavaScript-based browser controls are, see how easy it is to remove Google Docs security.  Users can also take screenshots and print to PDF files.

To stop users sharing training courses with others, documents making up the course must be locked to the user’s device.  This is achieved in a DRM system using encryption and license controls and ensures that only authorized users can open those documents.  If the documents that make up a training course are copied to an unauthorized device they will fail to open.

Other DRM controls are needed to enforce copyright ownership and control of elearning course materials and courseware by authorized users (i.e. stopping copy and paste, screen grabbing, etc.) and those are covered below.

Stopping copy and paste and screen grabs of course material


One easy way of copying course content is to make a screenshot, and screen grabbing tools enable users to do just that – making high quality copies that can be shared with others.

So any elearning course protection solution you purchase should be able to prevent screen grabbing of content and stop copying and pasting of content for use in another application.

It is always possible to use the camera feature in a cell phone to make screen copies and nothing is going to prevent that.  But you can discourage students from making and giving away copies by including watermarks on screen and print-outs that identify the student, show the time and date the copy was made and your Copyright marks.  So when protecting training course content, your DRM protection system must allow you to create dynamic watermarks (watermarks that dynamically add user identifiable information at view/print time).  This saves you having to know who the user is when protecting elearning courses and ending up with thousands of personalized copies of the same course.

Preventing editing of course content


Students need the ability to make notes while a training course is running (and these need to be capable of being linked to the relevant place in the course document or they are not going to be much help).  And these may need to be in a form that allows students to ‘swap’ notes.  At the same time however you need to protect course content from being edited so that it cannot be passed off as someone else’s work.

Locklizard enables students to make annotations (notes and markups) while preventing them from editing course content.

Preventing printing of training course content


Despite the problems of allowing printing at all (if you allow printing then documents could be photocopied), it is often necessary to allow particular sections of text to be printed.  Whilst at the same time making sure that the remainder of the text is protected or there won’t be much sales revenue coming in.

This can be achieved by having different protected documents, some of which can be printed and some of which cannot.  When it is less clear cut, and you want to allow controlled printing, your training course DRM solution must be able to prevent printing to file drivers (e.g. to a PDF file printer) otherwise students can make their own PDF files rather too easily.

Controlling access periods and expiring training courses


When protecting course content, your DRM controls should contain the ability to ensure your course content is time controlled.  This may be that it cannot be viewed before a certain date and/or can only be viewed for a designated amount of time.  This could be that users can open the protected content a number of times, or it can be used for a couple of weeks, months, or so on.

Document expiry controls should be flexible so that they can be applied to individual users rather than the documents that make up a course (you should of course have both expiry controls available so that you can expire both course content and user access).  When applying expiry at the user level, each student’s access period to content can be for the same amount of time (say a month) regardless of the date from when they start a course.  This is important if elearning courses can be purchased and taken at any time rather than always starting on a fixed date.  Additionally, you might decide that access to course content lasts for a number of days after the end of the course so that it can be used as a reference for a short time.

You should ensure that the elearning DRM system enables access periods to be altered at any stage to either increase or decrease the amount of time students have access to course content.  And that both user and document access can be instantly revoked.  You may need to do this for example if a chargeback has been made or some course material is incorrect and needs to be replaced.

Online course security, phone home and the ever-online philosophy


Your elearning course protection system has to be able to talk to an administration service to find out what is currently allowed with the document(s) such as the number of prints made out of a maximum number allowed, or the number of times a document has been viewed, and what they should be changed to if you find you need to alter their permission(s).  After all, you have to be able to change some controls after protecting course content to suit individual use cases.

Any needs to be able to operate without being online all the time, and to survive on being able to ‘phone home’ either when a connection is available or every so many days.  All the time the document is being used offline it must continue to enforce the security controls as defined by the last time it connected to its administration system.  And this must include the ability to revoke access to documents and individual users when it does get a connection to update itself.

Secure courseware eDelivery and offline use


While most students should be able to download courseware securely online, it should be possible with any elearning protection system to protect course content onto a flash drive and lock it to that device.  That way all the content of a training course can be secured onto a flash drive and distributed to every student but licensed piecemeal (so students can only access courses that they have paid for).

Locklizard provide a USB add-on that enables you to distribute training courses securely on USB devices along with a secure viewer – so students can view course content offline without installing any software.

Any system that enables offline use should provide the same level of security as online use.  Locklizard viewers enforce the same DRM controls whether in online or offline mode.

Location locking


It may be a requirement that training course content cannot be used outside of a specified location.  So you will need to ensure that content use can be locked to a country location, an IP address, or range of IPs.

Locklizard can automatically pick up a user’s location and lock training course content to that location.

Logging when training courses are viewed and printed


It may be important to see if and when a student has opened a course and if they have printed it (assuming you allow that functionality).  So the training course protection system you decide on should be able to log document use.

Most importantly however, you should know who you are tracking.  If documents are locked to authorized devices, you have a pretty good idea who the user is.  If however users login to an online system they can easily share login credentials and use the same IP address.  Your tracking information is therefore useless.

Preventing students sharing logins


You can’t prevent users from sharing login credentials or 2FA authentication information.  A more secure option is to prevent logged in users from gaining access to content they are not authorized to view.

If you protect course content using Locklizard, you can sell online courses from your website or upload them to an LMS without having to worry about who can access them.  Any user that logs in can download the content, but only users with licensed devices can view them.

Selling online courses securely – enforcing elearning copyright and intellectual property protection


When moving from a controlled teaching environment to remote learning it is important to ensure your elearning content is not readily stolen and illegally distributed.

There are many businesses selling online courses that choose a DRM system such as that designed by Locklizard, to protect their intellectual property wherever and whenever it is being used.  Locklizard enforce copyright ownership and control of elearning course materials and courseware providing complete intellectual property protection for online courses and training materials.  Securely sell online courses from your website without fear that they will be shared, copied and pirated.

  FAQs

Can you prevent students sharing logins for online courses?

No, but with Locklizard you don’t need to.  Course content can only be viewed on authorized devices.  So even if a user shares their login credentials with others, and downloads the materials to their device, they won’t be able to open the course content.

How do I stop online courses from being shared?

Courses must be locked to devices to stop them being shared, and you must stop all methods of copying content.  As well as locking course materials to devices (and optionally locations), Locklizard prevents users copying and pasting content, screen grabbing, editing and printing.

Does Locklizard protect video content with DRM?

No, Locklizard only provides DRM for PDF files.

The issue with video content is that it is easy to re-record using local or remote screen recording software, so DRM controls can be instantly stripped.

For your videos, the best way to protect them is to refer to content in the manual/course content so people have to purchase this as well to benefit.

Does Social DRM stop users from sharing course content?

The issue with social DRM, or social watermarking is that both visible and invisible watermarks can be removed.

If you want to add watermarks to courses to identify users then you need to use a security solution that enforces watermarks.

Can I revoke course content if it is stored on a device?

Yes, as long as you enforce validity checking with the licensing server.  This can be every time the user opens your course, every x days, or when an Internet connection is available.

Can I sell an online course securely from my website?

Yes.  It does not matter where you upload your protected courses to – your website, an LMS, file sharing site, etc.  You don’t have to store them in a protected folder or force users to login to yet another system.  Only authorized users will be able to view Locklizard protected courses.

Tags: copyright protection, digital course protection system, DRM for training course content, elearning content protection, elearning copyright, elearning course protection, elearning intellectual property protection, expire training courses, Intellectual Property Protection, Prevent printing of training course content, protect Online Courses & Training, protect training course content, protect training course material, protect your courses & course content from theft, Protection of course content, Secure Courseware eDelivery, sell online course, sell online course securely, sell online courses from your own website, Selling elearning courses securely, selling online courses, stop training course sharing, Stopping sharing of elearning courses and course content, training course intellectual property protection
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Document Security Certifications Link to: Document Security Certifications Document Security CertificationsLink to: Protect Revenue Generating Content Link to: Protect Revenue Generating Content Protect Revenue Generating Content
Scroll to top Scroll to top Scroll to top