For information on course costs and booking onto a course, please click here. For any queries please contact us on Training@ttslonline.com or call: 01582 550019Welcome, Guest

Spoofing Attacks

Overview

If you thought that spoofing was just imitating something for fun, then think again. Scammers use ‘spoofing’ techniques to pretend to be someone or something that they aren’t. Why? To get access to your money or data, or to gain access to your device or your employer’s system. Nothing fun about that. Spoofing can mean that you get tricked into clicking on malicious links or downloading malicious software. Falling for these nasty tricks or always believing that emails and texts are genuine puts you or your company at risk of loss..

Outline Learning Objectives:

  • Recognise the types of spoofing
  • Explain how spoofing attacks work
  • Demonstrate how to detect and protect against spoofing attacks

Who should take this course

There are lots of ways that a fraudster might try to spoof attack you, but they all rely on one essential element to be successful – the naivety and trusting nature of their would-be victims. But there are steps you can take to defend yourself. This course is gonna teach you the rules to help you not just survive but completely avoid a spoof attack.