This activity explains what a whaling attack is, how cybercriminals use it to gain access to personal data or systems, and how to spot and report it.
At the end of the course you will be able to:
There are no entry requirements.
Course assessment and certification
On successful completion of the final assessment a downloadable certificate is immediately available from your Online Training Academy Dashboard