How to Detect & Mitigate Phishing Threats
Organizations have to worry about phishing on two fronts: Both Spear Phishing, or targeted attacks intended to gain access to their data or systems, and Phishing targeted against their users or customers. This course defines and discusses phishing and related activities while applying examples and providing discussion around the detection, prevention, containment and remediation of phishing, spear phishing, email harvesting and bot activity.
We Want 100% Satisfaction: There is nothing worse than signing up for training only to find out that it wasn't on the topic you expected, or it wasn't advanced enough to provide value. If you have any doubt about the fit of a course to your particular needs, please give us a call. We will be happy to discuss the course, and to provide a more detailed overview on the content to ensure you make the most of your training dollars and time.
How to Detect & Mitigate Phishing
This course discusses how information used for phishing may be obtained and the high risk activity fraudsters or bots may display, including the application of techniques, technologies and third party services related to phishing, spear phishing and associated risk.
This course was released in January, 2019. Offered in HTML5 and compatible with all mobile devices.