5 out of 5
5
7 reviews on Udemy

Easily Identify Spam & Phishing E-mails

Identify e-mail scams BEFORE your corporate or personal data is breached!
Instructor:
Rafi Saar
178 students enrolled
English [Auto-generated]
How to avoid phishing attacks and therefore prevent data breaches in the office or at home
Well-defined rules to identify if an e-mail is legitimate or if it's spam / phishing attempt
Set specific e-mail settings to help identify spam and increase your security
What to do and what NOT to do when faced with fishy e-mails
Get a FREE checklist with my Phishing Identification Rules for your own use

[Last update: 1/31/2019]

We, humans, are the weakest link when facing online security breaches, both in the office and at home.
According to a Google study, phishing is the biggest threat to our online security.
We all get phishing e-mails; some of them always make it through our filters.  Those e-mails are dangerous because we can easily mistake them for a legitimate e-mail coming from a well-known company and we’ll want to click on some malicious link inside this e-mail, thinking that we’re doing the right thing.  Or we may be tempted to open some attached file because the e-mail made us curious to do so or because we don’t understand what the e-mail is about and we want to check it out further.

However, by clicking on such links or opening such documents, we may provide hackers access to our personal or corporate data and maybe even give them access to our computer and from there to our whole network!
Some large corporate hacks started with such phishing e-mails.  And all it takes is a single employee to fall prey for such an attack.

The most important way to prevent such data breaches is to educate ourselves and our employees in how to identify these scams and what to do about them.

So how can you tell if an e-mail is indeed coming from a known company or if it’s a phishing attempt?
In this course I will show you exactly how you can identify if an e-mail is spam or not by following a well-defined set of rules.
Throughout this course, I will use real examples from real e-mails I received to clearly illustrate everything that I teach.
I’ll also show you some e-mail settings you better define to help you out and keep you safer and I’ll also explain what to do and not to do.

This course is a MUST for everyone using e-mail in the office, at home, or on your mobile devices.

Introduction

1
Introduction
2
What Is Phishing?
3
Course Overview
4
Phishing Implications Example

Phishing E-mails Types

1
Deceptive Phishing
2
Reveal Money Making Secret
3
Offer a Cure
4
Money Offered
5
Money Requested
6
Other Examples

Phishing Identification Rules

1
Rule #1
2
Rule #2
3
Rule #3
4
Rule #4
5
Rule #5
6
Rule #6
7
Rule #7
8
Rule #8
9
Rule #9 - Most Important Rule 1
10
Rule #10
11
Rule #11
12
Rule #12
13
Rule #13 - Most Important Rule 2
14
Rule #14
15
Rule #15
16
Rule #16
17
Rule #17
18
Rule #18
19
Rule #19

Tricks Used to Fool Spam Filters

1
Rule #20
2
Rule #21
3
Rule #22
4
Phishing Identification Rules Checklist

Download the PDF file.
It's a checklist with all the Phishing Identification Rules for your own personal use when assessing e-mails.

Putting It All Together - Real Life Examples

1
Example 1
2
Example 2
3
Test e-mails

Let's check your knowledge with the following examples.
Each question includes a screen capture of an e-mail.
The question will appear below the screen capture.

If I hovered over a link, you will see the URL that appears in a small popup-window, without the cursor arrow.

Good luck!

What To Do and NOT To Do

1
Do's and Don't #1
2
Do's and Don't #2
3
Do's and Don't #3
4
Do's and Don't #4
5
Do's and Don't #5
6
Do's and Don't #6
7
Do's and Don't #7
8
Do's and Don't #8
9
Do's and Don't #9
10
Do's and Don't #10
11
Do's and Don't #11
12
Do's and Don't #12
13
Do's and Don't #13
14
Do's and Don't #14

Conclusion

1
Conclusion
2
Bonus Lecture: More Resources

Download the PDF file which includes additional resources.

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
5
5 out of 5
7 Ratings

Detailed Rating

Stars 5
7
Stars 4
0
Stars 3
0
Stars 2
0
Stars 1
0
6d22e2d1e03deb2904dd81b0f66b41bc
30-Day Money-Back Guarantee

Includes

3 hours on-demand video
2 articles
Full lifetime access
Access on mobile and TV
Certificate of Completion