Advanced

Identify and ward off current attack methods, e.g. “Next Level Phishing,” including a refresher of the basics.

Chapter 1

How do attackers operate?

  • Movie: Anatomy of a cyber attack.
  • Who are the attackers?
  • What are their goals?

Chapter 2

Dangerous file extensions

  • Which file extensions tend to be harmless, which are nasty?
  • Tip: Show file extensions
  • Dealing with macros

Chapter 3

Multi-factor authentication

  • What does multi-factor authentication mean?
  • Why is that so good?
  • What types are there?
  • Residual risks.

Chapter 4

Phishing Next Level

  • After the most important basics about phishing, it's now down to the details.
  • Current and advanced phishing techniques.