Phishing

Description
Discover the different phishing techniques: voice, e-mail, websites and text messages. After following the Phishing capsule, you will know how to recognize them and, more importantly, how to protect your personal data and computer system by avoiding the risks of phishing. You will be guided by concrete examples presenting advice in various phishing situations.
Specific objectives
- Understand what phishing is and recognize how it threatens information security.
- Recognize and identify the characteristics of a phishing message and website.
- Detect and manage phone scam tactics.
- Learn the six basic clues you need to be aware of to identify a phishing threat.