Building a Security Awareness Program: Phishing Simulations
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to run phishing tests to build security awareness among your employees.
Security awareness training is essential for any enterprise. But how do you keep employees alert to ever-evolving threats like phishing? In this course, Lauren Zink explores one popular method of raising security awareness: conducting phishing simulations. Whether you have a training program in place or you are trying to start one, this course provides guidance on building tests that can help employees understand the social engineering techniques that hackers use to get them to reveal credentials and proprietary data. Learn how to test your employees by writing realistic phishing emails and use metrics and feedback from the test to grow the program. Lauren explains exactly how to plan, execute, and conclude your test and how to make it a beneficial learning experience for you and your employees.
Security awareness training is essential for any enterprise. But how do you keep employees alert to ever-evolving threats like phishing? In this course, Lauren Zink explores one popular method of raising security awareness: conducting phishing simulations. Whether you have a training program in place or you are trying to start one, this course provides guidance on building tests that can help employees understand the social engineering techniques that hackers use to get them to reveal credentials and proprietary data. Learn how to test your employees by writing realistic phishing emails and use metrics and feedback from the test to grow the program. Lauren explains exactly how to plan, execute, and conclude your test and how to make it a beneficial learning experience for you and your employees.
Syllabus
Introduction
- Build security awareness with phishing tests
- What is phishing?
- Employee learning outcomes
- Company benefits
- Determine the audience
- Come up with a topic
- What teams need to be involved?
- Develop in house or use third party
- Fake email development
- Educational piece development
- Determine go-live and team support needs
- Alert necessary parties
- Potential employee responses
- Metrics that can be tracked
- Demonstrate cost avoidance
- Follow-up communication and education
- Next steps
Taught by
Lauren Zink
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera