Courses Phishing Security Champion

Security Champion: Understand How Attacks Actually Work

Go beyond recognition to understand phishing infrastructure, attacker techniques, and why these attacks work on smart people. After this course, you won't just spot phishing — you'll understand how attacks are built, why they work, and how to verify anything suspicious.

Understand How Attacks Actually Work

Go beyond recognition to understand phishing infrastructure, attacker techniques, and why these attacks work on smart people. After this course, you won't just spot phishing — you'll understand how attacks are built, why they work, and how to verify anything suspicious.

This intermediate course builds on the foundations from Spot the Scam and takes you deeper into the world of phishing — from dissecting URLs to understanding Business Email Compromise and becoming a security champion in your organization.

"Smart people fall for phishing not because they're careless, but because attackers are professionals who study human behavior for a living. Understanding their playbook is the best defense."

What You'll Learn

  • Read links like a pro — understand how web addresses work and how attackers abuse them
  • Why phishing works on smart people — the psychology and tactics behind successful attacks
  • Phishing beyond email — text, phone, chat, social media, QR codes, and more
  • Business Email Compromise — the most expensive type of phishing and how to stop it
  • Become a security champion — practical skills to protect yourself and your organization
Security Champion Cheat Sheet

14 rules to stop phishing — print it and keep it at your desk.

View Cheat Sheet

Course Curriculum

Final Assessment

10 min Certificate upon passing

Who Is This Course For?

Beginner Graduates

Completed Spot the Scam and ready to go deeper into how phishing actually works.

Power Users

Comfortable with technology and want to understand the mechanics behind attacks.

Team Leads & Managers

Understand BEC and other targeted attacks that specifically exploit organizational trust.

Ready to Go Deeper?

Understand how phishing attacks are built, why they work on smart people, and how to verify anything suspicious. About 4 hours of self-paced learning.

Begin Module 1