Cyber Security Module 4: Email Security - Recognizing a Cyber Attack
Interactive

Cyber Security Module 4: Email Security - Recognizing a Cyber Attack

Training Today
Updated Apr 10, 2019

Course Overview

E-mail is all but required for normal business operations, and it’s easy for cyber criminals to use as a vector of attack. But what does an e-mail attack look like, and how do you avoid it? This module is an introductory overview of cyber security best practices relating to e-mail security for new employees during onboarding or as a refresher course for those without a cyber security background.


Learning Objectives

By the end of the session, you will learn:

  • How to recognize an e-mail-based phishing attempt
  • Some of the tactics cyber criminals use to get a victim’s personal information
  • Some e-mail best practices

Duration

9 minutes