Phishing Identification and Mitigation
Phishing Identification and Mitigation
This instructor led, online training course allows organizations to increase their security defenses quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be effective defenders of their organizations’ data. The program is designed for non-technical end-users of computers, mobile devices, networks, and the Internet.
All individuals that have access to an organization’s information systems require a thorough understanding of their effect on cybersecurity. In this course, students will learn to identify phishing threats.

Instructor:
Derrick Coston, Security+, CISSP, CISA, GIAC
Course Information
Skills Learned
- Recognize different kinds of phishing threats
Who Should Attend This Course
This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.
Prerequisites
None
Course Outline
- Phishing
- Email Phishing
- Spear Phishing
- Whaling
- Smishing
- Vishing
- Clone Phishing
- Phishing techniques
- Phishing Mitigation