Cybersecurity: Protecting Against Phishing Threats

Module 1: Importance of this Training
1 Topic
Importance of cybersecurity in legal practice
Module 2: Understanding Phishing
3 Topics
What is Phishing?
Types of Phishing Attacks
Results of Successful Attacks
Module 3: Recognizing Phishing Attempts
9 Topics
Common signs of phishing emails
Mismatched URLs
Poor Grammar and Spelling
Poor Grammar and Spelling (cont.)
Unexpected Correspondence/ Unsolicited Requests
Unexpected Correspondence/Unsolicited Requests (cont.)
Urgent or Threatening Language
Urgent or Threatening Language (cont.)
Urgent or Threatening Language (cont.)
Module 4: Best Practices and Resources
1 Topic
Best Practice
Previous Topic
Next Topic

Module 3: Recognizing Phishing Attempts

Cybersecurity: Protecting Against Phishing Threats Module 3: Recognizing Phishing Attempts
Lesson Content
0% Complete 0/9 Steps
Common signs of phishing emails
Mismatched URLs
Poor Grammar and Spelling
Poor Grammar and Spelling (cont.)
Unexpected Correspondence/ Unsolicited Requests
Unexpected Correspondence/Unsolicited Requests (cont.)
Urgent or Threatening Language
Urgent or Threatening Language (cont.)
Urgent or Threatening Language (cont.)
Previous Topic
Back to Course
Next Topic
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account

Registration confirmation will be emailed to you.