Phishing has become a serious threat in the last few years to individuals and organizations. Employees have crucial role in identifying phishing attacks and report them to the IT team in a timely manner. How to counter the practice of sending fraudulent communications that appear to come from a reputable source?
Duration: 30 minutes
Target Audience: All employees, managers of an organization.
Course Prerequisites: None
Business Outcomes: To help employee with knowledge of phishing and how to mitigate or manage phishing risks to organization systems.
The below words only indicate, the relevance to go through the Phishing course, when we discuss about what it is when attempts are made to steal sensitive information, like usernames, passwords, credit card numbers, bank account information, etc., comes into the picture. These are not an exhaustive set of terms but are relevant for sure.
Authentication, Attack Vector, Encryption, Ransomware, Malware, Breach, Backdoor, Exploit, Firewall, Trojan Horse, Adware, Access Control, Spyware, BYOD, IP, Spoofing, Account Harvesting, Vulnerability Reduction, Deterrence.
After covering our existing course, if you need more details on a specific key word mentioned above or something unique to your organization, let us know and we will make those updates as needed, subject to discussion.
Phishing has become a serious threat in the last few years to individuals and organizations.
Employees have crucial role in identifying phishing attacks and report them to the IT team in a timely manner.
This eLearning course will help you know about phishing and associated risks and how to manage them.
Explain the concept of phishing.
Identify different phishing tactics and techniques.
Analyze the potential consequences of falling victim to a phishing attack on both an individual and organizational level.
Apply best practices to avoid phishing attacks.