Introduction
About phishing attacks
()
1. An Overview of Phishing
Phishing: The dangers of email
()
Money is the motive: The reason behind phishing
()
How does phishing affect us?
()
A review of the psychology behind social engineering attacks
()
2. Different Types of Phishing Attacks
Is it a harmless unknown caller or vishing?
()
Unfriended: How to spot a social media phish
()
Getting specific with targeted phishing attacks
()
SMS phishing: A text-based attack
()
Other notable methods of phishing
()
3. How to Catch a Phish
What makes phishing attacks successful?
()
Catch a phish red-handed: Common indicators of a phish
()
Is this a phish? Real-world examples of phishing attacks
()
4. How to Defend against Phishing Attacks
The most common ways to defend against a phish
()
How technology helps with the fight against phishing attacks
()
Practice makes perfect: An overview of phishing simulations
()
5. What Happens If You Fall for a Phish
Responding to a phishing attack at work
()
Falling for a phishing attack at home
()
Conclusion
Next steps and takeaways
()
Ex_Files_Cybersecurity_Awareness_Phishing_Attacks.zip
(33 KB)
Glossary_Cybersecurity_Awareness_Phishing.zip
(40 KB)