Course description

E-mail is all but required for normal business operations, and it’s easy for cyber criminals to use as a vector of attack. But what does an e-mail attack look like, and how do you avoid it? This module is an introductory overview of cyber security best practices relating to e-mail security for new employees during onboarding or as a refresher course for those without a cyber security background. You will learn how to recognize an e-mail-based phishing attempt and learn some of the tactics cyber criminals use to get a victim’s personal information. It then presents some e-mail best practices.

Course Duration: 9 min

Learning objectives:

At the completion of this course, the participant will be able to:
  • Recognize the tactics used in an E-mail cyberattack
  • Identify E-mail best practices
  • Recognize an E-mail phishing attack

Associated libraries

This course is included in the following libraries. Click on any library name to learn more.