Webinar: Cyber Attacks Through Impersonation
WC214 | Course | Basic | Scheduled
Description
This course describes how cyber attacks through impersonation are conducted. It also provides practical advice and recommended security controls to im
Credits
Number of Credits | Type of Credits |
---|---|
1.00 | Information Technology |
Designed For
Everyone should attend this to help avoid becoming a victim of an impersonation cyber attack
Prerequisites
None
Highlights
The major topics that will be covered in this class include:
- Impersonation techniques used to launch cyber attacks
- Cybercriminals' focus: stealing financial assets and intellectual property
- Practical advice on controls to implement to reduce victimization from impersonation cyber attacks
- Practical advice to reduce the impact of a cyber attack
Objectives
After attending this presentation you will be able to...
- Identify what a cyber impersonation attack is
- Recognize how impersonation attacks are conducted
- Distinguish security controls & protocols that can help prevent or minimize the impact of impersonation attacks
Preparation
None
Notes
Webinar Day - HELP and Assistance Instructions
- The session will open 30 minutes prior to the start time. At that time, you will receive a reminder email bringing you to your Attendee Dashboard and a link to join the webinar.
- We recommend you log in early to ensure you are ready to go when the presentation begins.
- IF YOU ARE HAVING TROUBLE LOGGING INTO THE WEBINAR, please call the CPA Crossings Customer Service Team at (877)-370-2220 Ext. #1.
Prices
- Member (Early Bird)
- $55.00
- Non-Member (Early Bird)
- $55.00
- Member
- $55.00
- Non-Member
- $55.00