Skip to main content

Cyber Attacks Through Impersonation WEBINAR

-

Add to Calendar

Your Desk

1.0 Credits

Member Price $55.00

Non-Member Price $75.00

Overview

This course describes how cyber-attacks through impersonation are conducted. It also provides practical advice and recommended security controls to implement, reducing the likelihood and impact of an impersonation cyber-attack.

Highlights

Impersonation techniques used to launch cyber-attacks. Cybercriminals’ focus: stealing financial assets and intellectual property. Practical advice on controls to implement to reduce victimization from impersonation cyber-attacks. Practical advice to reduce the impact of a cyber-attack.

Prerequisites

None.

Designed For

Everyone should attend this to help avoid becoming a victim of an impersonation cyber-attack.

Objectives

Identify what a cyber impersonation attack is. Recognize how impersonation attacks are conducted. Distinguish security controls and protocols that can help prevent or minimize the impact of impersonation attacks.

Preparation

None.

Notice

None.

Leader(s):

  • Petrina Youhan

Non-Member Price $75.00

Member Price $55.00