http://bitcoinseedbackup.com/
Video guides:
Cold Wallets are easy to use, but are not free. Make sure that you purchase directly from the manufacturer and DO NOT purchase a used wallet. Once you have one or more, you can secure your Bitcoin for long term storage and higher security. There are multiple reputable cold wallets (Coldcard, Ledger, Trezor, and more), but we recommend the Coldcard as it provides the security of storing your private key on a device that is not internet-enabled and can be isolated electrically from your computer if needed. You will need to download and install a desktop bitcoin wallet to work with your Coldcard. (Sparrow wallet is a great option, and they have an excellent guide for setting up your coldcard.)
Video guides:
For larger amounts of Bitcoin or enhanced security, consider multi-signature storage. In a multi-signature setup, multiple private keys are linked together to establish ownership of Bitcoin in a way that requires multiple keys to sign a transaction. An example would be having 3 private keys linked together such that any 2 of them can sign a transaction to send or receive Bitcoin.
There are two great companies that provide a concierge service that can help you acquire hardware wallets and set up multi-signature security if you are not comfortable setting it up yourself. These companies are Unchained Capital (https://unchained.com) and Casa (https://keys.casa/).
If you are technically inclined and would like to try setting up your own multi-signature setup, you can download and install a wallet application that supports generating a multisig wallet. Sparrow Bitcoin Wallet or Specter Desktop are great options, but there are others (Electrum, Wasabi, etc) that will work as well.
Once you have Bitcoin, it is good to practice moving it around by sending it to yourself or a family member. This can help you learn how to use public addresses and Lightning invoices.
Here are some sample workflows that can help you understand how Bitcoin public addresses and Lightning invoices work and how private keys can be generated and restored.