Phishing Training

Data Security Awareness

Phishing Training

Phishing Training

DATA SECURITY AWARENESS 
PHISHING TRAINING

Phishers trick people into divulging confidential information or into performing actions that enable unauthorized access into a computer network.

The best way to combat phishing is through information security awareness training.  People need to be educated about how not to be fooled.  Everyone in the workforce needs to be aware of the kinds of tricks fraudsters use and how to spot suspicious emails, attachments, links, or phone calls.  All it takes is one person to make one wrong click . . . and there’s a data breach!  The more people who are cautious and wise, the lower the risk.

Professor Daniel Solove brings his 15+ years of teaching experience to his phishing training.  He understands that great information security awareness training must make people care and remember.  The material must be explained clearly, understandably, and concretely.  Our phishing training, as well as all of our other information security awareness training courses, use interactivity, humor, and vivid imagery to engage people and make the lessons stick.

Our information security awareness training modules are highly customizable.  We have security training modules of many different lengths and styles.   We have 100+ topics on privacy and security.

For phishing training, we have at least 10 courses with extensive phishing content.  Here are a few of our courses that focus exclusively or heavily on phishing:


Phishing Training

Phishing training

This course is designed to raise awareness about phishing and inform trainees about the dangers. It teaches the warning signs to help trainees better spot phishing attempts, and it explains what people should do if they have any suspicions about an email or phone call.  There is an extended version (~12 minutes) and a condensed version (~6 minutes)

The full-length course is divided into three parts:

1. WHAT IS PHISHING?
Discusses the dangers and types of phishing.

2. HOW DO YOU SPOT A PHISHING ATTEMPT?
Discusses the various warning signs to look out for.

3. WHAT SHOULD YOU DO WHEN THINGS SEEM PHISHY?
Discusses what people should do when they have questions or suspicions.

 

Avoiding Phishers, Hackers and Social Engineers

 

Phishing Training

This course teaches phishing protection and how to avoid being victimized by hacker tricks and social engineering.  There is a  ~15 minute version and a ~10 minute version. The course covers:

• the various techniques of social engineering (such as phishing, baiting, and pretexting)
• common phishing techniques
• the types of threats contained in email
• the dangers from visiting websites or downloading software

 

The Email from the IT Department

 

Phishing Training

This interactive cartoon (~2 minutes) has trainees engage with a scenario involving what to do when receiving a potential phishing email purporting to come from the IT Department.

Phishing Training

Phishing – Introductory Course

 

Phishing Training

This course (~5.5 minutes) provides a short introduction to the threat of phishing. The course discusses phishing through email, phone, and websites. It covers common phishing techniques, as well as spear phishing. The course teaches trainees how to spot phishing attempts.

Capture

Social Engineering:  Spies and Sabotage

 

Phishing Training

This is a short module (~7 minutes long) that provides a general introduction to social engineering. After discussing several types of social engineering (phishing, baiting, pretexting, and tailgaiting), the course provides advice for avoiding these tricks and scams.

Phishing Training

 

The Ransomware Attack

 

Phishing Training

This short program (~5 minutes) is a highly interactive vignette about malware.   Ransomware is one of the most pernicious forms of malware — it works by encrypting a user’s files and demanding a ransom payment to decrypt the files.  Although this vignette involves ransomware, the lessons it teaches apply broadly to all malware.  The program focuses on how to avoid having malware installed on one’s computer and what to do (and not to do) if this ever happens.

Phishing Training

Click here for a listing of all our data security courses

Click here for our catalog

Phishing Simulator

Our simulated phishing training platform is easy-to-use and has a wide array of realistic phishing email templates to choose from.  For those who falter, you can put them into remedial training right away using one of our many courses on phishing.  Through a series of simulated phishing campaigns, your workforce will learn through direct experience.  Unlike some simulated phishing solutions that have minimal or weak training, our training is robust and strong.

Phishing Simulator

Please Contact Us to Evaluate Our Training

We can provide you with a login so you can evaluate the programs.

    First Name

    Last Name

    Organization

    Title

    E-mail

    Phone No.

    Address

    Please tell us about your training needs

    PROFESSOR SOLOVE'S NEWSLETTER
    Professor Solove’s newsletter covers his latest writings, events, and training. It is sent weekly.
    You can unsubscribe at any time. Click to see a sample issue.
    Would you be interested in subscribing?
    YesNoAlready Subscribed


    Save

    Save

    Save

    Save

    Save

    Save

    Save

    Save

    Save

    Save