DESCRIPTION
This scenario is designed as a guide to:
Understand what phishing is and the various types of phishing attacks
Understand the cycle or stages of a phishing attack
OBJECTIVES AND EXPECTED OUTCOMES
After completing this scenario, you will be able to:
Identify various types of phishing attacks
Understand how attackers carry out phishing attacks through the flow of information used
PREREQUISITES
There are no specific prerequisites to follow this scenario.
RECOMMENDED REFERENCES
There are no recommended reading sources for this scenario.
AUTHOR
This scenario was written by Trevor Saudi.
DESCRIPTION
This scenario is designed as a guide to:
Understand what phishing is and the various types of phishing attacks
Understand the cycle or stages of a phishing attack
OBJECTIVES AND EXPECTED OUTCOMES
After completing this scenario, you will be able to:
Identify various types of phishing attacks
Understand how attackers carry out phishing attacks through the flow of information used
PREREQUISITES
There are no specific prerequisites to follow this scenario.
RECOMMENDED REFERENCES
There are no recommended reading sources for this scenario.
AUTHOR
This scenario was written by Trevor Saudi.
Need Any Technology Solution