Course curriculum
-
1
Phish Spotting
-
What are Phish?
-
Phish Etymology
-
Business Email Compromise
-
Spotting Them Before They Spot You
-
Discussion Section
-
-
2
Phish Tales
-
The Target Breach
-
The Hack of the Clinton Campaign
-
Common Phish Scams
-
How to be a Phish Whisperer
-
Discussion Section
-
-
3
Business Email Compromise
-
Introduction to Business Email Compromise
-
The Nigerian Prince
-
Business Scams
-
Fighting Business Email Compromise
-
Discussion Section
-
-
4
Intro to Phishing Review
-
Part I
-
Part II
-
Part III
-
Part IV
-
Discussion Section
-
Ready to Start?
Get a Year of Micro-Lessons for Your Organization