Phishing

Course Description

Because today’s computers and networks are heavily defended from a direct assault, hackers are now much more likely target end-users when trying to break in. If hackers can trick you into divulging your username and password or inadvertently infecting your computer with malicious software, they can use your computer as a launching point to further penetrate your organization’s network. This HTML5-based, iPad-compatible course uses high-quality video and real-world simulations to teach best practices for recognizing and preventing both phishing and spear-phishing attacks.

12 Minutes