Advanced

Identify and ward off current attack methods, e.g. “Next Level Phishing,” including a refresher of the basics.

Main chapter

How do attackers operate?

  • Movie: Anatomy of a cyber attack.
  • Who are the attackers?
  • What are their goals?

Main chapter

Dangerous file extensions

  • Which file extensions tend to be harmless, which are nasty?
  • Tip: Show file extensions
  • Dealing with macros

Main chapter

Multi-factor authentication

  • What does multi-factor authentication mean?
  • Why is that so good?
  • What types are there?
  • Residual risks.

Main chapter

Phishing next level

  • The clever tricks of the attackers: QR codes, 2-stage phishing.
  • The right approach to spotting phishing.
  • Phishing of multi-factor credentials
  • Social engineering on the phone and via teams.