Cybersecurity Awareness: Phishing Attacks

Cybersecurity Awareness: Phishing Attacks

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 10m | 619 MB

Phishing is one of the easiest ways for digital attackers to claim multiple victims and reap potentially large payouts at the same time. With the rise of remote and hybrid work, phishing attacks have reached historic levels, as cybercriminals continue to take advantage of increased employee screen time. In this course, instructor Stephanie Ihezukwu covers everything you need to know about phishing and how to defend yourself against phishing attacks.

Learn about the reasons for phishing, how phishing works, and why social engineering attacks are on the rise in general. Explore different types of phishing attacks carried out by email, phone, social media, text message, and spam. Get tips on how to catch a phish by diving into real-world examples of phishing attacks with best practices on how to prevent them. After taking this course, you’ll have a better idea about how to spot a phish and respond effectively, even when an attack is successful.

Table of Contents

Introduction
1 About phishing attacks

An Overview of Phishing
2 Phishing The dangers of email
3 Money is the motive The reason behind phishing
4 How does phishing affect us
5 A review of the psychology behind social engineering attacks

Different Types of Phishing Attacks
6 Is it a harmless unknown caller or vishing
7 Unfriended How to spot a social media phish
8 Getting specific with targeted phishing attacks
9 SMS phishing A text-based attack
10 Other notable methods of phishing

How to Catch a Phish
11 What makes phishing attacks successful
12 Catch a phish red-handed Common indicators of a phish
13 Is this a phish Real-world examples of phishing attacks

How to Defend against Phishing Attacks
14 The most common ways to defend against a phish
15 How technology helps with the fight against phishing attacks
16 Practice makes perfect An overview of phishing simulations

What Happens If You Fall for a Phish
17 Responding to a phishing attack at work
18 Falling for a phishing attack at home

Conclusion
19 Next steps and takeaways

Homepage