Filters
Close

IT Security: Business E-mail Compromise

This IT Security: E-Mail Security Awareness online training course is designed for all employees who use corporate e-mail. In this course, you will learn about how cyberthieves acquire personal and sensitive information through e-mail, and infect computers, devices and networks with malware. Learn good practices for keeping e-mail systems and communications secure.
SKU: P0647EN
$40.00

This IT Security: Business E-mail Compromise online training course explores the e-mail fraud schemes known collectively as Business E-mail Compromise (BEC). In a BEC attack, cyberthieves compromise a corporate e-mail account and impersonate the e-mail account’s owner to deceive the company, its customers, partners, and/or employees into sending money or sensitive data to the cyberthieves account. Some BEC attacks are intended to extract money and others are targeting sensitive information such as tax statements and personally identifiable information (PII).

Course Learning Objectives

By taking this online IT Security: Business E-mail Compromise course, the user will learn to:

  • Explain how cyber thieves hack and spoof e-mail accounts
  • Describe common BEC schemes and their goals
  • Outline the characteristics of BEC e-mails
  • Recall policies for reducing financial loss
  • Summarize ways to minimize the risk of having your e-mail account hacked

Course Outline

This online IT Security: Business E-mail Compromise course is made up of the following sections:

  1. How Cyberthieves Prepare for BEC Attacks
  2. Common BEC Schemes
  3. Reducing the Probability of a BEC Attack

Course Audience

This IT Security: Business E-mail Compromise online training course was designed for employees in finance and human resources.

If you have any concerns as to whether this course is appropriate for you or your industry, please browse our full selection of online courses.

This IT Security: Business E-mail Compromise online training course explores the e-mail fraud schemes known collectively as Business E-mail Compromise (BEC). In a BEC attack, cyberthieves compromise a corporate e-mail account and impersonate the e-mail account’s owner to deceive the company, its customers, partners, and/or employees into sending money or sensitive data to the cyberthieves account. Some BEC attacks are intended to extract money and others are targeting sensitive information such as tax statements and personally identifiable information (PII).

Course Learning Objectives

By taking this online IT Security: Business E-mail Compromise course, the user will learn to:

  • Explain how cyber thieves hack and spoof e-mail accounts
  • Describe common BEC schemes and their goals
  • Outline the characteristics of BEC e-mails
  • Recall policies for reducing financial loss
  • Summarize ways to minimize the risk of having your e-mail account hacked

Course Outline

This online IT Security: Business E-mail Compromise course is made up of the following sections:

  1. How Cyberthieves Prepare for BEC Attacks
  2. Common BEC Schemes
  3. Reducing the Probability of a BEC Attack

Course Audience

This IT Security: Business E-mail Compromise online training course was designed for employees in finance and human resources.

If you have any concerns as to whether this course is appropriate for you or your industry, please browse our full selection of online courses.

Specifications
Course Language English
Length Range 30 Minutes or Less
Length (Hours) 0.50
Course Features Accessible, Audio, Mobile, Video
Module Number(s) 41163EN
Specifications
Course Language English
Length Range 30 Minutes or Less
Length (Hours) 0.50
Course Features Accessible, Audio, Mobile, Video
Module Number(s) 41163EN