Social Engineering: How to Safeguard Your Business Email

Write your awesome label here.
Course features
  • Category: Security Awareness
  • Course Length: 7 minutes
  • Series: Social Engineering
  • Video Length: 5.25 minutes
  • Resources: Avoiding BEC Scams Checklist
Course overview
This micro course, outlines the five types of business email compromise and teaches you how to detect the warning signs of this type of scam. You’ll find out how to detect the warning signs of this scam—and prevent attacks. 
Empty space, drag to resize
course learning objectives
  • Define what is business email compromise
  • Identify 5 types of business email compromise
  • Identify how to spot fraudulent emails
  • Examine why BEC attacks work
Empty space, drag to resize
Certification included
Downloadable certificate upon completion.

Skills you'll learn in this course

Cybersecurity

Mobile Devices

Information Security

What We Offer

What's included in this online course?

Video

Professional video is included with every course, discussing main topics and recapping key learning points.

Knowledge Checks

Check your retention of material and concepts with fun knowledge checks in the form of quizzes and games.

Engaging Material

Interactive elements, scenarios, and knowledge checks make learning entertaining and boost comprehension. 

Business Soft Skills

Critical knowledge to increase your value to your employer. Study at your own pace, at home or on the go.

Additional Resources

A list of additional resources is included with each course, directing students to extra material for further study.

Summary / Checklist

Each course comes with a summary of the key areas taught, in addition to a checklist for immediate implementation of ideas.