When autocomplete results are available use up and down arrows to review and enter to select.
Cyberthieves use victims’ personal information to steal their money and identities. They attack victims’ computers and other devices with malware attacks. Learn what phishing is, the various ways cyberthieves try to exploit our computer systems and personal information, the types of damage they can cause, and the ways to reduce the likelihood of being “phished”.
Learning Objectives:
Recall the three common characteristics of most phishing messages
Outline the methods for identifying phishing e-mails
Describe targeted phishing techniques used by cyberthieves
Recognize phishing attacks on social media and recall how to avoid them
Summarize the negative consequences of successful phishing attacks on individuals and organizations
Course Outline:
Introduction
Phishing basics
Targeted e-mail phishing techniques
Phishing on social media platforms
Consequences of phishing attacks
Rev–Mar. 2021. Course Length ≈ 20 minutes.
This course is worth 0.5 CPE credits.