Easily Identify Spam & Phishing E-mails
4.4 (189 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
609 students enrolled

Easily Identify Spam & Phishing E-mails

Identify e-mail scams BEFORE your corporate or personal data is breached!
4.4 (189 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
609 students enrolled
Created by Rafi Saar
Last updated 2/2020
English
English [Auto-generated]
Current price: $61.99 Original price: $94.99 Discount: 35% off
17 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3 hours on-demand video
  • 2 articles
  • 2 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • How to avoid phishing attacks and therefore prevent data breaches in the office or at home
  • Well-defined rules to identify if an e-mail is legitimate or if it's spam / phishing attempt
  • Set specific e-mail settings to help identify spam and increase your security
  • What to do and what NOT to do when faced with fishy e-mails
  • Get a FREE checklist with my Phishing Identification Rules for your own use
Requirements
  • Use any e-mail program on any platform: Windows / Mac / Web / Android / iOS / etc.
Description

[Last update: 02/02/2020]

We, humans, are the weakest link when facing online security breaches, both in the office and at home.
According to a Google study, phishing is the biggest threat to our online security.
We all get phishing e-mails; some of them always make it through our filters.  Those e-mails are dangerous because we can easily mistake them for a legitimate e-mail coming from a well-known company and we'll want to click on some malicious link inside this e-mail, thinking that we're doing the right thing.  Or we may be tempted to open some attached file because the e-mail made us curious to do so or because we don't understand what the e-mail is about and we want to check it out further.

However, by clicking on such links or opening such documents, we may provide hackers access to our personal or corporate data and maybe even give them access to our computer and from there to our whole network!
Some large corporate hacks started with such phishing e-mails.  And all it takes is a single employee to fall prey for such an attack.

The most important way to prevent such data breaches is to educate ourselves and our employees in how to identify these scams and what to do about them.

So how can you tell if an e-mail is indeed coming from a known company or if it's a phishing attempt?
In this course I will show you exactly how you can identify if an e-mail is spam or not by following a well-defined set of rules.
Throughout this course, I will use real examples from real e-mails I received to clearly illustrate everything that I teach.
I'll also show you some e-mail settings you better define to help you out and keep you safer and I'll also explain what to do and not to do.

This course is a MUST for everyone using e-mail in the office, at home, or on your mobile devices.

Who this course is for:
  • This course is a MUST for all e-mail users: in corporations, small businesses, and at home
Course content
Expand all 51 lectures 03:10:51
+ Phishing E-mails Types
6 lectures 17:27
Reveal Money Making Secret
02:08
Offer a Cure
02:43
Money Offered
03:03
Money Requested
02:39
+ Phishing Identification Rules
19 lectures 01:18:51
Rule #1
03:25
Rule #2
01:55
Rule #3
08:05
Rule #4
02:21
Rule #5
02:35
Rule #6
03:23
Rule #7
02:48
Rule #8
03:43
Rule #9 - Most Important Rule 1
11:21
Rule #10
02:55
Rule #11
01:44
Rule #12
03:28
Rule #13 - Most Important Rule 2
10:59
Rule #14
04:11
Rule #15
03:42
Rule #16
01:34
Rule #17
06:28
Rule #18
02:04
Rule #19
02:10
+ Tricks Used to Fool Spam Filters
4 lectures 16:01
Rule #20
06:53
Rule #21
06:04
Rule #22
02:52

Download the PDF file.
It's a checklist with all the Phishing Identification Rules for your own personal use when assessing e-mails.

Phishing Identification Rules Checklist
00:12
+ Putting It All Together - Real Life Examples
2 lectures 17:56
Example 1
10:48
Example 2
07:08

Let's check your knowledge with the following examples.
Each question includes a screen capture of an e-mail.
The question will appear below the screen capture.

If I hovered over a link, you will see the URL that appears in a small popup-window, without the cursor arrow.

Good luck!

Test e-mails
4 questions
+ What To Do and NOT To Do
14 lectures 45:11
Do's and Don't #1
01:45
Do's and Don't #2
03:05
Do's and Don't #3
01:16
Do's and Don't #4
11:04
Do's and Don't #5
05:00
Do's and Don't #6
02:23
Do's and Don't #7
02:22
Do's and Don't #8
00:50
Do's and Don't #10
04:02
Do's and Don't #11
01:40
Do's and Don't #12
02:26
Do's and Don't #13
02:11
Do's and Don't #14
03:59
+ Conclusion
2 lectures 01:12
Conclusion
01:08

Download the PDF file which includes additional resources.

Bonus Lecture: More Resources
00:04