IT Security: Business E-mail Compromise
This IT Security: E-Mail Security Awareness online training course is designed for all employees who use corporate e-mail. In this course, you will learn about how cyberthieves acquire personal and sensitive information through e-mail, and infect computers, devices and networks with malware. Learn good practices for keeping e-mail systems and communications secure.
This IT Security: Business E-mail Compromise online training course explores the e-mail fraud schemes known collectively Business E-mail Compromise (BEC). In a BEC attack, cyberthieves compromise a corporate e-mail account and impersonate the e-mail account’s owner to deceive the company, its customers, partners and/or employees into sending money or sensitive data to the cyberthieves’ account. Some BEC attacks are intended to extract money and others are targeting sensitive information such as tax statements and personally identifiable information (PII).
Course Learning Objectives
On completion of this online IT Security: Business E-mail Compromise course, the user will learn to:
- Explain how cyberthieves hack and spoof e-mail accounts
- Describe common BEC schemes and their goals
- Outline the characteristics of BEC e-mails
- Recall policies for reducing financial loss
- Summarize ways to minimize the risk of having your e-mail account hacked
This online IT Security: Business E-mail Compromise course is made up of the following sections:
- How Cyberthieves Prepare for BEC Attacks
- Common BEC Schemes
- Reducing the Probability of a BEC Attack
This IT Security: Business E-mail Compromise online training course was designed for employees in finance and human resources.
If you have any concerns as to whether this course is appropriate for you or your industry, please browse our full selection of online courses.