Course Overview
E-mail is all but required for normal business operations, and it’s easy for cyber criminals to use as a vector of attack. But what does an e-mail attack lo
Course Overview
E-mail is all but required for normal business operations, and it’s easy for cyber criminals to use as a vector of attack. But what does an e-mail attack look like, and how do you avoid it? This module is an introductory overview of cyber security best practices relating to e-mail security for new employees during onboarding or as a refresher course for those without a cyber security background.
Learning Objectives
By the end of the session, you will learn:
Duration
9 minutes
Write a public review