Overview
All individuals that have access to an organization’s information systems require a thorough understanding of their effect on cybersecurity. In this course, students will learn to identify phishing threats.
Course Outline
- Email Phishing
- Spear Phishing
- Whaling
- Smishing
- Vishing
- Clone Phishing
- Phishing techniques
- Phishing Mitigation
Skills Learned
After completing this online training course, students will be able to:
- Recognize different kinds of phishing threats