EMAIL CYBER SECURITY

EMAIL CYBER SECURITY

Online cybersecurity training is to help employees to protect themselves and the company against cyber attacks and threats. Training empowers employees with an up-to-date know-how on how to recognize and mitigate a cyber-threat. By making employees able to identify and eliminate cyber threats, you are strengthening the most vulnerable link in the chain. This way, phishers will willingly move on to other people’s waters, as there is no ‘phish’ in your waters to trap with their baits.


Features

COMPARE PACKAGE FEATURES

Delivery Method:

Required device:

Bandwidth needed:

Assessment:

Passmark:

Certificate fee:

Certificate Method:

Access:

the deal


Fully through elearning.

Laptop or Smart Phone

+- 250Mb

Online QUIZ.

80%

Free

Instant PDF download.

3100

CONTENT

PART 1

Emails and structure.

PART 2

Spoofing and attachments.

PART 3

Spamming and compliance.

CONTENT

1. INTRODUCTION TO EMAILS.

    • INTRODUCTION
    • ACTIVITY
    • EMAIL SECURITY TERMINOLOGY

2. TYPES OF EMAIL ACCOUNTS AVAILABLE.

    • TYPES OF EMAIL ACCOUNTS
    • EMAIL TYPE: “POP”
    • EMAIL TYPE: “IMAP”
    • EMAIL TYPE: “EXCHANGE”

3. STRUCTURE OF AN EMAIL AND EMAIL ADDRESS.

    • EMAIL STRUCTURE
    • THE EMAIL HEADER
    • EMAIL ADDRESS
    • STRUCTURE
    • THE @ SYMBOL

4. EMAIL HEADERS AND PROPERTIES.

    • ABOUT EMAIL HEADERS AND PROPERTIES
    • HOW TO VIEW AN EMAILS HEADERS AND PROPERTIES.
    • UNDERSTANDING EMAIL HEADERS
      IP ADDRESS

CONTENT

1. EMAIL SPOOFING

    • WHAT IS EMAIL SPOOFING
    • REASONS FOR EMAIL SPOOFING
    • HOW TO DETECT EMAIL SPOOFING
    • HOW TO STOP EMAIL SPOOFING

2. SELECT, MANAGE AND TEST YOUR VIRUS PROTECTION.

    • YOUR VIRUS PROTECTIONS
    • REVIEW YOUR VIRUS PROTECTION
    • MINIMIZE INCOMING PHISHING EMAILS
    • TEST YOUR ANTIVIRUS SOFTWARE

3. MALWARE AND HOW IT WORKS.

    • WHAT IS MALWARE?
    • HOW DO I KNOW IF I DEVICE IS INFECTED?
    • SUSPICIOUS EMAIL WARNING SIGNS.
    • HOW DO I GET MALWARE?
    • WHAT TO DO IF YOU CLICK ON A SUSPICIOUS EMAIL LINK?
    • WHAT DOES MALWARE DO?
    • HOW MUCH CAN A HACKER ACTUALLY SEE ON YOUR MACHINE?

4. ATTACHMENTS AND FILE TYPES.

    • WHAT IS A DATA FILE?
    • WHERE ARE DATA FILES STORED?
    • HOW TO VIEW THE FILE TYPE?
    • COMMON FILE TYPES AND EXTENSIONS?
    • HOW TO SPOT UN-SAFE FILES?
    • FILE SIZE
    • PROTECTION VIEW

5. EXTERNAL AND INTERNAL URLs LINKS.

    • WHAT IS A URL?
    • EXTERNAL URL
    • LINKS
    • BREAKING DOWN
    • THE URL
    • STRUCTURE
    • FTP URL
    • LOCAL NETWORK
    • URL
    • CLOUD SERVICE
    • COMMON TRICKS USED

CONTENT

1. SPAM

    • WHAT IS SPAM
    • WHAT IS THE PURPOSE OF SPAM
    • WHY DO I GET SPAM EMAILS
    • SPAM vs PHISHING
    • HOW DO I STOP SPAM

2. EMAIL CONFIDENTIALITY DISCLAIMERS.

    • INTRODUCTION
    • COMMON REASONS TO USE EMAIL
    • DISCLAIMERS
    • PURPOSE OF EMAIL
    • CONFIDENTIALITY STATEMENTS?
    • HOW CAN AN EMAIL DISCLAIMER PROTECT YOU?
    • IS AN EMAIL DISCLAIMER LEGALLY BINDING?

3. COMPLIANCE

    • INTRODUCTION
    • GDPR COMPLIANCE
    • EUROPEAN COMPANIES
    • HIPAA
    • COMPLIANCE – UNITED STATES
      COMPANY
    • POLICIES.

4. NEWSLETTERS

    • INTRODUCTION
    • WHAT DOES THE LAY