Building a Security Awareness Program: Phishing Simulations
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to run phishing tests to build security awareness among your employees.
Security awareness training is essential for any enterprise. But how do you keep employees alert to ever-evolving threats like phishing? In this course, Lauren Zink explores one popular method of raising security awareness: conducting phishing simulations. Whether you have a training program in place or you are trying to start one, this course provides guidance on building tests that can help employees understand the social engineering techniques that hackers use to get them to reveal credentials and proprietary data. Learn how to test your employees by writing realistic phishing emails and use metrics and feedback from the test to grow the program. Lauren explains exactly how to plan, execute, and conclude your test and how to make it a beneficial learning experience for you and your employees.
Security awareness training is essential for any enterprise. But how do you keep employees alert to ever-evolving threats like phishing? In this course, Lauren Zink explores one popular method of raising security awareness: conducting phishing simulations. Whether you have a training program in place or you are trying to start one, this course provides guidance on building tests that can help employees understand the social engineering techniques that hackers use to get them to reveal credentials and proprietary data. Learn how to test your employees by writing realistic phishing emails and use metrics and feedback from the test to grow the program. Lauren explains exactly how to plan, execute, and conclude your test and how to make it a beneficial learning experience for you and your employees.
Syllabus
Introduction
- Build security awareness with phishing tests
- What is phishing?
- Employee learning outcomes
- Company benefits
- Determine the audience
- Come up with a topic
- What teams need to be involved?
- Develop in house or use third party
- Fake email development
- Educational piece development
- Determine go-live and team support needs
- Alert necessary parties
- Potential employee responses
- Metrics that can be tracked
- Demonstrate cost avoidance
- Follow-up communication and education
- Next steps
Taught by
Lauren Zink
Related Courses
Information Security Management in a NutshellSAP Learning Enterprise and Infrastructure Security
New York University (NYU) via Coursera Personal Risk Reduction In Insecure Contexts
Politecnico di Milano via Polimi OPEN KNOWLEDGE Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Pluralsight Cyber Security Essentials: Your Role in Protecting the Company
Pluralsight