Spoofing Attacks

Cyber Security Collection

< Back to Collection

Phishing Awareness | Online Training

Spoofing Attacks

Scammers use ‘spoofing’ techniques to pretend to be someone or something that they aren’t. Why do they do it? To get access to your money or data, or to gain access to your device or your employer’s system. Spoofing can mean that you get tricked into clicking on malicious links or downloading malicious software. Falling for these nasty tricks or always believing that emails and texts are genuine puts you or your company at risk of loss. So, it’s essential that you know what to look for and how to avoid becoming a victim of a spoofing attack.

Learning Outcomes

• Recognise the types of spoofing• Explain how spoofing attacks work • Demonstrate how to detect and protect against spoofing attacks

What you will learn

This cyber security training course will help you to recognise the most common types of spoofing, so you know what to look out for. It’ll explain how spoofing attacks work so you know how fraudsters use these techniques and what they stand to gain from them. This online safety training course also demonstrates how to detect and protect yourself against spoofing attacks, so you can stay safe and protect your employer’s data and systems.]

Who I this course for

With similarities to a phishing awareness course, spoofing is another way a criminal could get your data. Everyone will find this course useful because anyone who uses a phone or computer could become the victim of a spoofing attack, where cyber criminals trick you into clicking malicious links or downloading malicious software.

Accessibility

Everyone has the right to learn and learner need can vary demanding on environment or disabilities. This course comes with transcripts so people have text options for an media, subtitles for all videos and is screen reader friendly with alternative text.We take a number of steps to ensure visuals and navigation is easy for your people. For more information on the steps we take for accessibility check out how we make our courses.

  • Collection
    Cyber Security Collection
  • Course Title
    Spoofing Attacks
  • Duration
    15 min
  • Courses in Collection

Collection includes:

  • Library of related content
  • Robust management platform
  • Mobile access
  • Tutorials, videos, SCORM Content
  • Microlearning Courses