Phishing Identification and Mitigation

 

Real Class Example

Phishing Identification and Mitigation

This instructor led, online training course allows organizations to increase their security defenses quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be effective defenders of their organizations’ data. The program is designed for non-technical end-users of computers, mobile devices, networks, and the Internet.

All individuals that have access to an organization’s information systems require a thorough understanding of their effect on cybersecurity. In this course, students will learn to identify phishing threats.

Instructor:

Derrick Coston, Security+, CISSP, CISA, GIAC

Course Information

Skills Learned

  • Recognize different kinds of phishing threats

Who Should Attend This Course

This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.

Course Outline

  • Phishing
    • Email Phishing
    • Spear Phishing
    • Whaling
    • Smishing
    • Vishing
    • Clone Phishing
    • Phishing techniques
    • Phishing Mitigation

Like What You See? Let’s Get Started Training.

Call 480-850-9200 or submit below to get pricing for you or your team.