DATA SECURITY AWARENESS
PHISHING TRAINING
Phishers trick people into divulging confidential information or into performing actions that enable unauthorized access into a computer network.
The best way to combat phishing is through information security awareness training. People need to be educated about how not to be fooled. Everyone in the workforce needs to be aware of the kinds of tricks fraudsters use and how to spot suspicious emails, attachments, links, or phone calls. All it takes is one person to make one wrong click . . . and there’s a data breach! The more people who are cautious and wise, the lower the risk.
Professor Daniel Solove brings his 15+ years of teaching experience to his phishing training. He understands that great information security awareness training must make people care and remember. The material must be explained clearly, understandably, and concretely. Our phishing training, as well as all of our other information security awareness training courses, use interactivity, humor, and vivid imagery to engage people and make the lessons stick.
Our information security awareness training modules are highly customizable. We have security training modules of many different lengths and styles. We have 100+ topics on privacy and security.
For phishing training, we have at least 10 courses with extensive phishing content. Here are a few of our courses that focus exclusively or heavily on phishing:
This course is designed to raise awareness about phishing and inform trainees about the dangers. It teaches the warning signs to help trainees better spot phishing attempts, and it explains what people should do if they have any suspicions about an email or phone call. There is an extended version (~12 minutes) and a condensed version (~6 minutes)
The full-length course is divided into three parts:
1. WHAT IS PHISHING?
Discusses the dangers and types of phishing.
2. HOW DO YOU SPOT A PHISHING ATTEMPT?
Discusses the various warning signs to look out for.
3. WHAT SHOULD YOU DO WHEN THINGS SEEM PHISHY?
Discusses what people should do when they have questions or suspicions.
Avoiding Phishers, Hackers and Social Engineers
This course teaches phishing protection and how to avoid being victimized by hacker tricks and social engineering. There is a ~15 minute version and a ~10 minute version. The course covers:
• the various techniques of social engineering (such as phishing, baiting, and pretexting)
• common phishing techniques
• the types of threats contained in email
• the dangers from visiting websites or downloading software
The Email from the IT Department
This interactive cartoon (~2 minutes) has trainees engage with a scenario involving what to do when receiving a potential phishing email purporting to come from the IT Department.
Phishing – Introductory Course
This course (~5.5 minutes) provides a short introduction to the threat of phishing. The course discusses phishing through email, phone, and websites. It covers common phishing techniques, as well as spear phishing. The course teaches trainees how to spot phishing attempts.
Social Engineering: Spies and Sabotage
This is a short module (~7 minutes long) that provides a general introduction to social engineering. After discussing several types of social engineering (phishing, baiting, pretexting, and tailgaiting), the course provides advice for avoiding these tricks and scams.
The Ransomware Attack
This short program (~5 minutes) is a highly interactive vignette about malware. Ransomware is one of the most pernicious forms of malware — it works by encrypting a user’s files and demanding a ransom payment to decrypt the files. Although this vignette involves ransomware, the lessons it teaches apply broadly to all malware. The program focuses on how to avoid having malware installed on one’s computer and what to do (and not to do) if this ever happens.
Click here for a listing of all our data security courses
Phishing Simulator
Our simulated phishing training platform is easy-to-use and has a wide array of realistic phishing email templates to choose from. For those who falter, you can put them into remedial training right away using one of our many courses on phishing. Through a series of simulated phishing campaigns, your workforce will learn through direct experience. Unlike some simulated phishing solutions that have minimal or weak training, our training is robust and strong.
Please Contact Us to Evaluate Our Training
We can provide you with a login so you can evaluate the programs.