Objective
Hackers call data centers and pretend to be customers who have lost their passwords or show up at a site and simply wait for someone to open a door. Hackers have been known to create phony websites, sweepstakes, or questionnaires that ask users to enter a password. Phishing is a technique used to obtain sensitive information by impersonating oneself as a trustworthy entity in an electronic communication.
In Part II of Phishing Awareness, you will learn about different types of phishing attacks, techniques for discovering attacks, characteristics of phishing emails, etc., providing employees with very deep knowledge in responding to the growing amount of phishing emails. The course is designed for organizations that must comply with the regulatory requirements, support phishing awareness campaigns, and educate employees about the impact of social engineering attacks, especially those exposed to private data, financial data, and highly sensitive and confidential data. In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning, followed by the end of the course final assessment.