Overview

Cyber criminals target using our most trusted form of communication: our phone.

The technology behind telecommunications is open for exploitation - and cyber criminals know this! Criminals impersonate our most trusted contacts, in the hope that they can fool us into divulging sensitive information, transferring money or even agreeing to allow them access to premises.

Learning Objectives

By the end of this course, you will be able to:

  • Explain SMShing
  • Explain Vishing
  • Identify warning signs
  • Understand how to implement preventative tools

This course has a minimum of 25 learner registrations for us to provide a quotation.

Request a Quotation
Language
UK
Date last updated
7/26/2024
Duration
15 Minutes
Suitable Devices
  • PC
  • Phone
  • Tablet
Audio is Required
  • Optional
Includes Video
  • Yes
Downloadable Resources
  • No
Completion Criteria
  • Pass final test
  • Visit all pages
Pass Mark
  • 80% pass mark required
Course Technology
  • HTML5
  • SCORM 1.2
Can be customised
  • Available at an Additional Cost
Accreditation or Endorsements
  • No
Languages
  • Available at an Additional Cost
Image of a SkillStation dashboard

Let's get started

with a demo and a 30-day free trial.

Cookies

To provide you with the best experience, we use cookies. You can read the details on our

Privacy Policy.