Skip main navigation

Defining Spear-phishing

In this video, you will be introduced to spear-phishing and its objectives, identify who is at risk and explore the red flags and warning signs one should look out for …

Tactics and Examples of Phishing Attacks

In this video, you will learn about the tactics phishing attackers use and work through real-life examples to identify the warning signs one should look out for to identify a …

What Is Phishing?

Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in an email. The video will highlight the objectives of the attackers, and you …

What to Expect This Week

This week, you will learn about several types of social engineering techniques that you may encounter. Learning Outcomes By the end of this week, you will be able to: describe …

Week 4 Overview

Over the course of the past 20 years, malware has evolved significantly, and is becoming increasingly sophisticated. We will cover three more malware types, Adware, Spyware, and File-less malware, before …

You Have Reached the End of Week 3

Congratulations! You have reached the end of Week 1. In this week, you learned more about malware and its characteristics. You also learned more about various types of Malware, such …

Recapping Social Engineering Attacks

Social Engineering Cybersecurity Attacks Dumpster Diving | Tailgating | Baiting | Impersonation Work through the summary below to review the definitions of social engineering attacks and be reminded of the …

Free Tools to Identify Viruses

How do you know whether an attachment or download is safe? Most likely, you have antivirus software installed on your computer. In this course, you will be exposed to several …

What to Expect this Week

This week we’ll focus on viruses, malware, and the differences between them. We’ll also touch on the characteristics of worms, trojans and ransomware. By working through examples you will be …

Test Instructions

The following test is going to assess your understanding of what you have learned within this past week of the course. Remember, you do not have to take the test …

Recapping Email-based Attacks

Email Based Attacks Phishing | Spear-phishing | Whaling Definitions Phishing: The fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in an email. Spear-phishing: The act …