Phishing Awareness Training
Teach your team to spot phishing attacks before they click. Real-world scenarios built from actual penetration testing engagements.
Start TrainingWhat You'll Learn
Four comprehensive modules covering every aspect of phishing defense, from basic email red flags to advanced BEC tactics.
Email Phishing Red Flags
Recognize suspicious sender addresses, urgency tactics, malicious links, spoofed domains, and the psychological triggers attackers exploit to bypass your defenses.
Spear Phishing & BEC Attacks
Understand targeted campaigns that impersonate executives, vendors, and trusted contacts. Learn how attackers research victims and craft convincing pretexts.
Reporting & Response Procedures
Master proper procedures for reporting phishing attempts, escalating threats to your security team, and protecting colleagues from active campaigns in progress.
Safe Browsing & Link Verification
Develop safe web browsing practices to avoid drive-by downloads, malicious redirects, fake login pages, watering hole attacks, and credential harvesting sites.
Course Modules
A structured learning path that builds your team's phishing defense skills from foundational knowledge to advanced threat recognition.
Understanding the Phishing Threat Landscape
- What phishing is and why it's the #1 attack vector
- Types of phishing: email, SMS (smishing), voice (vishing), and QR codes (quishing)
- How attackers choose their targets and build campaigns
- Real breach case studies caused by phishing attacks
- The psychology behind why phishing works
Identifying Phishing Emails & Messages
- Analyzing sender addresses and header information
- Spotting spoofed domains and lookalike URLs
- Recognizing urgency, fear, and authority manipulation tactics
- Identifying malicious attachments and embedded links
- Interactive exercise: Spot the phishing email (real examples)
Spear Phishing, BEC & Targeted Attacks
- How attackers use OSINT to craft personalized attacks
- Business Email Compromise (BEC): CEO fraud, invoice scams, payroll diversion
- Vendor and supply chain email compromise scenarios
- Wire transfer and payment redirect attack patterns
- Verification procedures and out-of-band confirmation techniques
Reporting, Response & Safe Browsing
- How to report suspected phishing to your security team
- What to do if you've already clicked a malicious link
- Protecting colleagues from active phishing campaigns
- Safe browsing habits: URL verification, HTTPS checking, bookmark usage
- Password manager usage and MFA as phishing defenses
Real-World Examples You'll Analyze
Every scenario in this course is based on actual attacks we've encountered during penetration testing engagements.
The CFO Wire Transfer
An attacker impersonates the CEO via email, requesting an urgent wire transfer to a "new vendor." The email comes from a domain that's one character off from the real one.
The Microsoft 365 Login Page
A convincing Microsoft login page hosted on a compromised WordPress site captures credentials. The only tell is a slightly wrong URL that most employees overlook.
The HR Benefits Update
Employees receive a personalized email about their benefits enrollment with an attachment that installs malware. Names and departments pulled from LinkedIn.
The Vendor Invoice Redirect
A legitimate vendor's email is compromised and used to send invoices with updated bank details. The email thread is real, only the payment details have changed.
Built for Every Role in Your Organization
Phishing targets everyone. This course gives every employee the skills to defend themselves and your organization.
All Employees
Foundational phishing awareness for everyone
Finance Teams
BEC and wire fraud defense training
Data Handlers
Protecting sensitive data from social engineering
Customer Support
Defending against pretexting and impersonation
Common Questions
Is this course suitable for non-technical employees?
Does this include phishing simulations?
How often should employees retake this training?
Do employees receive a certificate upon completion?
Protect Your Team from Phishing Attacks
Reduce your organization's #1 cyber risk. Deploy phishing awareness training to your entire team in minutes.