Professional Certificate in Phishing in a Connected World
-- ViewingNowThe Professional Certificate in Phishing in a Connected World is a crucial course that focuses on the pervasive issue of phishing in today's interconnected digital landscape. With the increasing reliance on technology and data, the importance of cybersecurity has never been greater.
4.992+
Students enrolled
GBP £ 140
GBP £ 202
Save 44% with our special offer
รber diesen Kurs
100% online
Lernen Sie von รผberall
Teilbares Zertifikat
Zu Ihrem LinkedIn-Profil hinzufรผgen
2 Monate zum Abschlieรen
bei 2-3 Stunden pro Woche
Jederzeit beginnen
Keine Wartezeit
Kursdetails
โข Understanding Phishing: An overview of phishing, including its definition, history, and prevalence in the connected world. This unit will cover the basics of phishing attacks, the different types of phishing, and why phishing remains a significant threat to individuals and organizations.
โข Phishing Techniques and Tactics: An in-depth analysis of the techniques and tactics used by phishers to trick victims into revealing sensitive information. This unit will cover topics such as social engineering, spear phishing, whaling, and business email compromise (BEC).
โข Recognizing Phishing Attempts: Strategies for identifying and avoiding phishing attempts, including common red flags and warning signs. This unit will cover best practices for email, social media, and messaging app security.
โข Responding to Phishing Attacks: A guide to responding to phishing attacks, including steps to take if you suspect you have been phished, and how to protect yourself and your organization from further harm. This unit will cover incident response planning and communication strategies.
โข Security Awareness Training: Techniques for creating and delivering effective security awareness training programs that help prevent phishing attacks. This unit will cover topics such as training design, delivery, and evaluation, as well as how to create a culture of security awareness.
โข Phishing Tools and Technologies: An exploration of the tools and technologies used to prevent and detect phishing attacks, including email filters, web application firewalls, and two-factor authentication. This unit will cover the strengths and limitations of these tools and how to use them effectively.
โข Legal and Regulatory Considerations: An overview of the legal and regulatory considerations related to phishing, including data protection laws, compliance requirements, and incident reporting obligations. This unit will cover best practices for managing legal and regulatory risk.
Karriereweg