Whaling attack eLearning Course
Overview
This activity explains what a whaling attack is, how cybercriminals use it to gain access to personal data or systems, and how to spot and report it.
This course forms part of the Access Group’s latest range of cyber security training. It is accredited and endorsed by the UK’s National Cyber Security Centre (NCSC), an organisation with a mission to make the UK the safest place to live and work online
Objectives
On completing this activity, you will be able to:
- Understand why executives and their assistants can become victims of whaling attacks,
- Identify the techniques cybercriminals use to carry out whaling attacks,
- Recognise the risks and impact of a whaling attack,
- Spot the signs of whaling attempts,
- Know the steps you can take to prevent a successful whaling attack on your organisation, and
- Know what immediate actions to take in the event of becoming a victim of a whaling attack.
This course has a minimum of 25 learner registrations for us to provide a quotation.
Request a Quotation- Language
- UK
- Date last updated
- 11/15/2022
- Duration
- 5 Minutes
- Suitable Devices
-
- PC
- Phone
- Tablet
- Audio is Required
-
- Yes
- Includes Video
-
- Yes
- Downloadable Resources
-
- No
- Completion Criteria
-
- Pass final test
- Visit all pages
- Pass Mark
-
- 80% pass mark required
- Course Technology
-
- HTML5
- SCORM 1.2
- Can be customised
-
- No
- Accreditation or Endorsements
-
- NCSC
- Languages
-
- English
- Multiple Languages available within Course