Cybersecurity Awareness: Phishing and Whaling

Go to class
Write Review

Free Online Course: Cybersecurity Awareness: Phishing and Whaling provided by LinkedIn Learning is a comprehensive online course, which lasts for Less than 1 hour of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Cybersecurity Awareness: Phishing and Whaling is taught by Todd Edmands.

Overview
  • Phishing and whaling defraud millions of companies every year. Find out how to identify these attacks, and reduce your risk.

    Phishing and whaling are types of cybercrime used to defraud people and organizations. The average 10,000-employee company spends $3.7 million dollars a year dealing with phishing and whaling attacks alone. It's imperative that all employees of an organization are educated on how to avoid these attacks.

    Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.

    This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.

Syllabus
  • Introduction

    • Welcome
    1. What Is Phishing?
    • Understanding phishing
    • Advanced phishing methods
    2. Types and Impacts of Phishing
    • Types of phishing
    • Impacts of successful phishing attacks
    3. Various Methods of Phishing Attacks
    • Phishing methodologies
    • Phishing examples
    4. Solutions to Reduce Phishing
    • How to reduce phishing
    • Use of technology in phishing attacks
    • Learn never to take the bait
    5. Whaling
    • Understanding whaling
    • How hacktivists plan whaling attacks
    • Examples of whaling
    Conclusion
    • Solutions to reduce whaling
    • Summary