They talk about us :

La Tribune - Parole d'expert (in French)

References

Themes

Phishing has been used for many years by hackers. However, this phishing technique has been perfected over time, both in terms of the form of these false e-mails and the scenarios that are increasingly elaborate.
Today, phishing is also the first vector of contamination of a new cyber threat in full expansion: ransomware.
These malwares that demand a ransom in exchange for your data contaminate thousands of computers every day.
Faced with these threats and more broadly to counter the so-called “social engineering” techniques used by malicious people, it has become essential to raise awareness among employees to limit the exposure of your organization to new cyber risks.

This e-learning module “Phishing & Ransomware awareness” allows you to acquire in less than 30 minutes the right reflexes to protect yourself.

Objectives

  • Identify the different forms of phishing and social engineering attacks
  • Recognize and manage suspicious e-mails
  • Apply good practices and prevention measures on a daily basis
  • Understand the challenges of hackers and the consequences of malware
  • Implement the right reflexes in case of contamination
  • Understand how Ransomware works
  • Protect yourself from a Ransomware attack

Target audience

Any person within an organization (company, association, interest group…) connected to the network and receiving e-mails.

Prerequisites

The training is designed to be accessible to all, without any prior knowledge in the technical field.

Duration

One 30 minutes module.

Training material

  • Videos: trainer + animations, diagrams, key points in motion design
  • Practical Phishing cases
  • Tests to validate your knowledge
  • Additional documents and useful links

Content

  • Phishing and social engineering: definitions.
  • Motivations of cybercriminals.
  • What happens when you click on a phishing link? An infected attachment?
  • Signs of a contamination. Spyware and other Keyloggers.
  • Consequences for individuals and organizations.
  • The levers used by hackers. The different forms of phishing.
  • Good practices and vigilance.
  • How to identify and deal with suspicious e-mails?
  • What to do if you think you have been hit?
  • Examples of phishing.
  • Ransomware or Ransomware.
  • Focus on WannaCry and Not Petya.
  • How to protect yourself from a Ransomware attack?
  • Other social engineering threats: President / technical support scam, SCAM, malvertising…
  • In summary, good practices.