This IT Security: Business E-mail Compromise online training course explores the e-mail fraud schemes known collectively Business E-mail Compromise (BEC). In a BEC attack, cyberthieves compromise a corporate e-mail account and impersonate the e-mail account’s owner to deceive the company, its customers, partners and/or employees into sending money or sensitive data to the cyberthieves’ account. Some BEC attacks are intended to extract money and others are targeting sensitive information such as tax statements and personally identifiable information (PII).
Course Learning Objectives:
On completion of this IT Security: Business E-mail Compromise course, the user will learn to:
- Explain how cyberthieves hack and spoof e-mail accounts
- Describe common BEC schemes and their goals
- Outline the characteristics of BEC e-mails
- Recall policies for reducing financial loss
- Summarize ways to minimize the risk of having your e-mail account hacked
Course Outline:
- How Cyberthieves Prepare for BEC Attacks
- Common BEC Schemes
- Reducing the Probability of a BEC Attack
Course Audience:
This IT Security: Business E-mail Compromise online training course was designed for employees in finance and human resources.
If you have any concerns as to whether this course is appropriate for you or your industry, please browse our full selection of online courses.