Security Champion: Understand How Attacks Actually Work
Go beyond recognition to understand phishing infrastructure, attacker techniques, and why these attacks work on smart people. After this course, you won't just spot phishing — you'll understand how attacks are built, why they work, and how to verify anything suspicious.
Understand How Attacks Actually Work
Go beyond recognition to understand phishing infrastructure, attacker techniques, and why these attacks work on smart people. After this course, you won't just spot phishing — you'll understand how attacks are built, why they work, and how to verify anything suspicious.
This intermediate course builds on the foundations from Spot the Scam and takes you deeper into the world of phishing — from dissecting URLs to understanding Business Email Compromise and becoming a security champion in your organization.
"Smart people fall for phishing not because they're careless, but because attackers are professionals who study human behavior for a living. Understanding their playbook is the best defense."
What You'll Learn
- Read links like a pro — understand how web addresses work and how attackers abuse them
- Why phishing works on smart people — the psychology and tactics behind successful attacks
- Phishing beyond email — text, phone, chat, social media, QR codes, and more
- Business Email Compromise — the most expensive type of phishing and how to stop it
- Become a security champion — practical skills to protect yourself and your organization
14 rules to stop phishing — print it and keep it at your desk.
Course Curriculum
Reading Links Like a Pro
Why Phishing Works on Smart People
Phishing Is Bigger Than Email
Business Email Compromise
Becoming a Security Champion
Final Assessment
Who Is This Course For?
Beginner Graduates
Completed Spot the Scam and ready to go deeper into how phishing actually works.
Power Users
Comfortable with technology and want to understand the mechanics behind attacks.
Team Leads & Managers
Understand BEC and other targeted attacks that specifically exploit organizational trust.
Ready to Go Deeper?
Understand how phishing attacks are built, why they work on smart people, and how to verify anything suspicious. About 4 hours of self-paced learning.
Begin Module 1