PhishProof

Think as an attacker. Defend as an expert.

PhishProof will guide you through the dark waters of digital deception, where phishing becomes a sophisticated weapon in the hands of attackers – from psychological manipulation to techniques exploiting spoofed domains, infected attachments, and fake login pages. Across six modules, you will learn to recognize attacks, understand the motivations of attackers, and gain practical tools to protect yourself and the university environment. You’ll encounter various types of threat actors, including the most advanced ones who exploit artificial intelligence and social engineering. Through videos, tasks, and real-world examples, you will build skills that help protect not only you, but also the university and its data. The digital world is full of deception – PhishProof helps you see what others overlook.

No description

Pro whom: students and staff of MU

Format: online self-paced course

Language: available in CZ / EN

Duration: 180–360 minutes

Enroll the course

Course overview

  • Tricked Into Action

    You'll learn what phishing is and why it's so effective. You’ll discover how to spot key signs of fraudulent emails and understand why our intuition often fails. The module introduces various phishing methods – from classic emails to QR codes and voice-based attacks.

  • Attacker

    Get to know who’s behind phishing – from amateurs to state-sponsored hackers. Understand their motivations and how their tactics have evolved over time. You’ll also see how artificial intelligence helps attackers craft targeted and efficient scams.

  • Technology

    Learn how to recognize fake links, domain manipulations, and how attackers exploit basic internet protocols. You’ll try tools like VirusTotal to check suspicious links or attachments. You’ll also explore how malware and ransomware work.

  • Psychology

    Find out why our decision-making often fails and how attackers use emotions, heuristics, and cognitive biases against us. You'll debunk common myths about phishing and gain awareness of your own vulnerabilities. Real-world exercises will help you detect psychological tricks in emails.

  • Fall for It

    Understand the real consequences of a successful phishing attack – for individuals, universities, and society. You'll analyze real cases, such as attacks on hospitals or geopolitical impacts. Phishing affects not just systems, but people too.

  • Resist

    Gain practical tips to protect your data – from password managers to multi-factor authentication. Learn how to think critically and develop habits that make you more resilient. Finally, discover how and where to report phishing incidents if they happen.

Frequently Asked Questions

Will I receive a certificate after completing the course?

No certificate is provided, as the course focuses primarily on improving your practical skills rather than offering formal accreditation.

Will course materials and guides be available after I finish the course?

Yes, all course materials and guides will remain available, so you can revisit them anytime to refresh your knowledge.

You are running an old browser version. We recommend updating your browser to its latest version.

More info