Course curriculum

  • 1

    Phish Spotting

    • What are Phish?

    • Phish Etymology

    • Business Email Compromise

    • Spotting Them Before They Spot You

    • Discussion Section

  • 2

    Phish Tales

    • The Target Breach

    • The Hack of the Clinton Campaign

    • Common Phish Scams

    • How to be a Phish Whisperer

    • Discussion Section

  • 3

    Business Email Compromise

    • Introduction to Business Email Compromise

    • The Nigerian Prince

    • Business Scams

    • Fighting Business Email Compromise

    • Discussion Section

  • 4

    Intro to Phishing Review

    • Part I

    • Part II

    • Part III

    • Part IV

    • Discussion Section

Ready to Start?

Get a Year of Micro-Lessons for Your Organization