Description
This activity explains what phishing is, how cybercriminals use it to obtain personal data and how to spot then report it.
Learning objectives
At the end of the course you will be able to:
Entry requirements
There are no entry requirements.
Course assessment and certification
On successful completion of the final assessment a downloadable certificate is immediately available from your Online Training Academy Dashboard