For information on course costs and booking onto a course, please click here. For any queries please contact us on business@nptcgroup.ac.uk or call: 0330 81 88 100Welcome, Guest

Telephone Attacks

Overview

Cyber criminals target using our most trusted form of communication: our phone.

The technology behind telecommunications is open for exploitation - and cyber criminals know this! Criminals impersonate our most trusted contacts, in the hope that they can fool us into divulging sensitive information, transferring money or even agreeing to allow them access to premises.

Learning Objectives

By the end of this course, you will be able to:

  • Explain SMShing
  • Explain Vishing
  • Identify warning signs
  • Understand how to implement preventative tools