- Content library
- About Us
- Contact us
- LMS log in
- Get started
Anyone who uses a phone or computer could become the victim of a spoofing attack, where cyber criminals trick you into clicking malicious links or downloading malicious software . There are lots of ways that a fraudster might try to spoof attack you for their own gain. But they all rely on one essential element to be successful – the naivety and trusting nature of their would-be victims. But there are steps you can take to defend yourself. This course is going to teach you the rules to help you not just survive but completely avoid a spoof attack.
This course will help you to recognise the most common types of spoofing, so you know what to look out for. It will explain how spoofing attacks work so you know how fraudsters use these techniques and what they stand to gain from them. And it will demonstrate how to detect and protect yourself against spoofing attacks, so you can stay safe and protect your employer’s data and systems.
When you hear the term ‘spoof,’ it’s quite likely your first thought will be about funny movies that imitate something for laughs. But spoofing attacks are something altogether more sinister. Scammers use ‘spoofing’ techniques to pretend to be someone or something that they aren’t. Why do they do it? To get access to your money or data, or to gain access to your device or your employer’s system. There’s nothing fun about that.
Spoofing can mean that you get tricked into clicking on malicious links or downloading malicious software. Falling for these nasty tricks or always believing that emails and texts are genuine puts you or your company at risk of loss. So, it’s essential that you know what to look for and how to avoid becoming a victim of a spoofing attack.
The idea of someone gaining your trust to trick you is pretty scary. And just like there are rules to surviving a horror movie, there are rules to follow to avoid becoming the victim of a spoofing attack. We decided to work with the theme of horror movies for this course, to evoke that sense of being afraid. But don’t worry, there’s no guts or gore here, we’ve used horror icons and tropes to deliver a course that’s light and fun but packs a serious punch.
This course uses fun, first rate animation delivered alongside interactive learning that gives the learner the chance to practice protecting themselves against spoof attacks. By providing the learner with a safe environment in which to interact with possible spoof emails, this course gives learners first-hand experience that increases their safety and their confidence. It even provides a handy infographic, so you can be confident that learners will recognise the most common forms of spoofing attacks and know how to protect against them.
Everyone has the right to learn and learner need can vary demanding on environment or disabilities. This course comes with transcripts so people have text options for an media, subtitles for all videos and is screen reader friendly with alternative text.
We take a number of steps to ensure visuals and navigation is easy for your people. For more information on the steps we take for accessibility check out how we make our courses.