This IT Security: Business E-mail Compromise online training course explores the e-mail fraud schemes known collectively as Business E-mail Compromise (BEC). In a BEC attack, cyberthieves compromise a corporate e-mail account and impersonate the e-mail account’s owner to deceive the company, its customers, partners, and/or employees into sending money or sensitive data to the cyberthieves account. Some BEC attacks are intended to extract money and others are targeting sensitive information such as tax statements and personally identifiable information (PII).
Course Learning Objectives
By taking this online IT Security: Business E-mail Compromise course, the user will learn to:
- Explain how cyber thieves hack and spoof e-mail accounts
- Describe common BEC schemes and their goals
- Outline the characteristics of BEC e-mails
- Recall policies for reducing financial loss
- Summarize ways to minimize the risk of having your e-mail account hacked
This online IT Security: Business E-mail Compromise course is made up of the following sections:
- How Cyberthieves Prepare for BEC Attacks
- Common BEC Schemes
- Reducing the Probability of a BEC Attack
This IT Security: Business E-mail Compromise online training course was designed for employees in finance and human resources.
If you have any concerns as to whether this course is appropriate for you or your industry, please browse our full selection of online courses.