zdnet[.]com/article/windows-11-security-guide/
zdnet[.]com/article/bitlocker-guide-how-to-use-this-windows-encryption-tool-to-protect-your-data/
While Ed focuses on Win11 in his security guide, most applies to Win10 as well. The security guide doesn't contain anything revolutionary -- just a nice collection of the basics.
While there's lots of info available on BitLocker, most of it is published on sites targeting IT pros, so if you're interested, Ed's guide is probably going to be useful. BitLocker encrypts the contents of most any storage device, from hard disks to microSD cards, so if a device is lost or stolen anything stored is not accessible. It's officially available only with Windows Ent, Pro, or Edu, but software like Hasleo's BitLocker Anywhere [previously on GOTD] -- easyuefi[.]com/bitlocker-anywhere/bitlocker-anywhere-home.html -- let's you use it on Home versions. Ed writes that TPM is necessary, but you can use BitLocker without it...
howtogeek[.]com/howto/6229/how-to-use-bitlocker-on-drives-without-tpm/
docs.microsoft[.]com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq#can-i-use-bitlocker-on-an-operating-system-drive-without-a-tpm
VeraCrypt, the successor to TrueCrypt, is an open source alternative -- the biggest difference I think is that BitLocker saves a key to access encrypted storage if you don't have the password [corp IT needs to access the laptop turned in by a fired employee], which VeraCrypt does not. VeraCrypt can also be handy to encrypt a VHD [Virtual Hard Disk] you create in Windows to use as a storage vault, and can be used portably, e.g., you can put both the encrypted VHD & VeraCrypt of a USB stick.
sourceforge[.]net/projects/veracrypt/