The second subunit will focus on the various phishing techniques and attack vectors employed by cybercriminals to manipulate individuals into divulging sensitive information or performing certain actions. We aim to equip learners with the knowledge and skills to identify various phishing techniques and attack vectors used by cybercriminals. The objectives of this subunit are to familiarize learners with common phishing tactics, enhance their ability to recognize potential threats, and equip them with the knowledge to mitigate risks effectively.
The materials needed are:
Case studies illustrating different phishing scenarios.
Real-world examples of phishing emails.
Interactive simulations or demonstrations of phishing attacks.