Full program description
Email Security Fundamentals. Certificate awarded on completion of 5 courses:
Use this link to get back to the student dashboard when you are enrolled in the course.
https://expand.iu.edu/dashboard/in-progress
Use this link to get back to the student dashboard when you are enrolled in the course.
https://expand.iu.edu/dashboard/in-progress
Business Email Compromise
Identifying BEC scams, differentiating between the three main types of BEC scams, and reporting a suspected attack.
Malicious LinksHyperlinks are the easiest tool that cyber criminals can use to deliver malware—all it takes is the click of a link.
Malware
Malware
Various forms of malware might spy on your activity, allow attackers remote access to your drives, or take control of your device.
Ransomware
Ransomware
What ransomware is and how it is delivered, ransomware’s effect, minimizing the threat of ransomware, and reporting ransomware attacks.
Spear Phishing
A majority of cyber-intrusion attempts begin with spear phishing emails. These targeted attacks are delivered via malicious links, file attachments, and login forms.
Spear Phishing
A majority of cyber-intrusion attempts begin with spear phishing emails. These targeted attacks are delivered via malicious links, file attachments, and login forms.