Introduction

'What is every hacker's weekend getaway? They go phishing.'

Welcome

Welcome to the third part of our Cyber Security course. During the previous part, we covered some common cybersecurity threats that you may encounter, and during this course, we're delving deeper into 1 of them, Phishing.

Generally speaking, these are scams where the goal is to make the victim give their personal information to the scammer, often through emails or other messages. Nowadays, phishing is a common issue, that people and companies alike can run into every day.

This Course Will Cover

  1. What is phishing really, what does a phishing email look like
  2. Different ways to spot phishing scams, what are some of the common red flags you might see in them
  3. What tools can be used to protect you from them
  4. What to do if you've become a victim of a phishing scam, and what are some of the different ways you can prevent further damage

Can You Spot a Phishing email

What's the big deal, fake emails are easy to spot right? Not quite, scammers and hackers get more clever by the day and find new ways to get around our protections. During this course, we'll go over a small practical test where you can test yourself if you're able to tell apart legitimate emails and phishing emails.

'After this course, you'll know how to spot phishing emails, and how you can defend yourself from them in the future.

You'll also learn how to react if you end up becoming a victim of phishing yourself.'

Essential Terminology

"There's no conceivable system that can stop 1 person in 100, opening a phishing email and that can be all it takes"

  • Ciaran Martin, first CEO of the National Cyber Security Centre

In terms of terminology, phishing is a pretty simple topic. Most terms revolve around basic terms that you often come across when dealing with emails. However, if you encounter terms that you don't recognize while going through this course, use this lesson as your cheat-sheet.

Phishing Phishing is a cybercrime in which a target is contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data

Cybercrime Cybercrime is a criminal activity that either targets or uses a computer, a computer network, or a networked device.

Attachments An email attachment is a computer file sent along with an email message.

Hyperlink A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new section within the current document.

Virustotal All of your combined viruses? Not quite. Virustotal is a website that can be used to identify if links and files are potentially dangerous to your system.

Encrypted emails Email encryption is used to protect the content from being read by entities other than the intended recipients. Email encryption may also include authentication.

Multi-Factor Authentication An authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application or online account

Spam Filters Spam filters detect unsolicited, unwanted, and virus-infested email and stop them from getting into email inboxes.

Firewalls A network security device that monitors incoming and outgoing network traffic and decided whether to allow or block specific traffic based on security rules.

Exercise: Phishing Basics


Exercise: Protective Measures