In this video, you will be introduced to spear-phishing and its objectives, identify who is at risk and explore the red flags and warning signs one should look out for …
In this video, you will learn about the tactics phishing attackers use and work through real-life examples to identify the warning signs one should look out for to identify a …
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in an email. The video will highlight the objectives of the attackers, and you …
In the video, you will learn about GrandCrab. Launched in 2018, and distributed on the Dark Web, it used an affiliate program that could be described as “ransomware as a …
Over the next four weeks, you will learn more about cybersecurity attacks related to phishing, several types of social engineering attacks as well as various types of malicious applications. The …
This week, you will learn about several types of social engineering techniques that you may encounter. Learning Outcomes By the end of this week, you will be able to: describe …
Over the course of the past 20 years, malware has evolved significantly, and is becoming increasingly sophisticated. We will cover three more malware types, Adware, Spyware, and File-less malware, before …
Congratulations! You have reached the end of Week 1. In this week, you learned more about malware and its characteristics. You also learned more about various types of Malware, such …
Social Engineering Cybersecurity Attacks Dumpster Diving | Tailgating | Baiting | Impersonation Work through the summary below to review the definitions of social engineering attacks and be reminded of the …
How do you know whether an attachment or download is safe? Most likely, you have antivirus software installed on your computer. In this course, you will be exposed to several …
This week we’ll focus on viruses, malware, and the differences between them. We’ll also touch on the characteristics of worms, trojans and ransomware. By working through examples you will be …
The following test is going to assess your understanding of what you have learned within this past week of the course. Remember, you do not have to take the test …
Email Based Attacks Phishing | Spear-phishing | Whaling Definitions Phishing: The fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in an email. Spear-phishing: The act …
In this course, you will see four quizzes. Quizzes are for practice. They do not contribute to your final score. They’re a fantastic opportunity for you to check your progress …