Overview

This activity explains what a whaling attack is, how cybercriminals use it to gain access to personal data or systems, and how to spot and report it.

This course forms part of the Access Group’s latest range of cyber security training. It is accredited and endorsed by the UK’s National Cyber Security Centre (NCSC), an organisation with a mission to make the UK the safest place to live and work online

Objectives

On completing this activity, you will be able to:

  • Understand why executives and their assistants can become victims of whaling attacks,
  • Identify the techniques cybercriminals use to carry out whaling attacks,
  • Recognise the risks and impact of a whaling attack,
  • Spot the signs of whaling attempts,
  • Know the steps you can take to prevent a successful whaling attack on your organisation, and
  • Know what immediate actions to take in the event of becoming a victim of a whaling attack.

This course has a minimum of 25 learner registrations for us to provide a quotation.

Request a Quotation
Language
UK
Date last updated
11/15/2022
Duration
5 Minutes
Suitable Devices
  • PC
  • Phone
  • Tablet
Audio is Required
  • Yes
Includes Video
  • Yes
Downloadable Resources
  • No
Completion Criteria
  • Pass final test
  • Visit all pages
Pass Mark
  • 80% pass mark required
Course Technology
  • HTML5
  • SCORM 1.2
Can be customised
  • No
Accreditation or Endorsements
  • NCSC
Languages
  • English
  • Multiple Languages available within Course
Image of a SkillStation dashboard

Let's get started

with a demo and a 30-day free trial.

Cookies

To provide you with the best experience, we use cookies. You can read the details on our

Privacy Policy.