-
-
Course Information Security
-
015 Phishing
-
INTRODUCTION
-
A Case Study
-
What Is Information Security?
-
What’s at Stake?
-
-
RISK IDENTIFICATION AND PREVENTION
-
Passwords
-
Social Engineering
-
Phishing and Email Attacks
-
Malware Programs
-
Wireless Networks
-
Physical Surroundings
-
Information Sharing
-
-
CONCLUSION
-
Quiz
-
A Summary Checklist
-