PhishProof
"Phishing through an attacker's eyes: attack vectors revealed."
The course will guide you through the murky waters of digital fraud, where phishing becomes a sophisticated weapon of attackers. From the perspective of an experienced cybercriminal, you will discover the tricks designed to get you to click on a fraudulent link or open an infected attachment. You'll understand the psychological manipulations, the technological finesse and the dark economics of phishing as a service. You'll learn how to spot invisible threats, protect yourself with security technologies and the right mindset. The course won't intimidate you, but it will equip you with practical skills - because knowledge is the best defence.
For whom: students/employees.
Format: just online self-study.
Variants: ready in CZ/EN version.
How long: range from 90 to 180 min.
Course content
-
The main goal, to bring you to action
You will learn to think like an attacker and protect yourself from manipulation.
-
Attacker
You'll discover who's behind the phishing, their motivations and how their tactics change.
-
Technology
You'll understand the technical tricks of phishing, from fake links to automated attacks.
-
Psychology
You'll explore why people fall for it and how attackers exploit human weaknesses.
-
You have succumbed
You'll learn how phishing impacts individuals, businesses and society.
-
Resist
You'll learn practical strategies to detect, resist and report phishing.
Frequently asked questions
Will I receive a certificate or certificate of attendance after completing the course?
Will there be materials or tutorials available for me to refer back to after the course?
“The course brings a refreshing and unconventional approach to cyber security education - instead of boring warnings, it immerses you in the world of attackers and their strategies. With authentic narration from the perspective of an experienced cybercriminal, you'll not only understand how phishing works, but also realize how easily anyone can fall into the trap. The course brilliantly combines technical details with the psychological aspects of manipulation and offers practical tools for protection.”
Alice, R.