Telephone Attacks eLearning Course
Overview
Cyber criminals target using our most trusted form of communication: our phone.
The technology behind telecommunications is open for exploitation - and cyber criminals know this! Criminals impersonate our most trusted contacts, in the hope that they can fool us into divulging sensitive information, transferring money or even agreeing to allow them access to premises.
Learning Objectives
By the end of this course, you will be able to:
- Explain SMShing
- Explain Vishing
- Identify warning signs
- Understand how to implement preventative tools
This course has a minimum of 25 learner registrations for us to provide a quotation.
Request a Quotation- Language
- UK
- Date last updated
- 7/26/2024
- Duration
- 15 Minutes
- Suitable Devices
-
- PC
- Phone
- Tablet
- Audio is Required
-
- Optional
- Includes Video
-
- Yes
- Downloadable Resources
-
- No
- Completion Criteria
-
- Pass final test
- Visit all pages
- Pass Mark
-
- 80% pass mark required
- Course Technology
-
- HTML5
- SCORM 1.2
- Can be customised
-
- Available at an Additional Cost
- Accreditation or Endorsements
-
- No
- Languages
-
- Available at an Additional Cost