Advanced
Identify and ward off current attack methods, e.g. “Next Level Phishing,” including a refresher of the basics.
Chapter 1
How do attackers operate?
- Movie: Anatomy of a cyber attack.
- Who are the attackers?
- What are their goals?
Chapter 2
Dangerous file extensions
- Which file extensions tend to be harmless, which are nasty?
- Tip: Show file extensions
- Dealing with macros
Chapter 3
Multi-factor authentication
- What does multi-factor authentication mean?
- Why is that so good?
- What types are there?
- Residual risks.
Chapter 4
Phishing Next Level
- After the most important basics about phishing, it's now down to the details.
- Current and advanced phishing techniques.