Course Complete
You Are a Security Champion!
You've completed the Security Champion course and earned the skills to protect yourself, your team, and your organization from phishing attacks
Your Certificate
This certifies that
Your Name
is now a Certified Security Champion, having successfully completed
Security Champion: Understand How Attacks Actually Work
Mastering URL Analysis, Attack Psychology, Multi-Channel Threats, BEC Defense & Security Leadership
What You Learned
Reading Links Like a Pro
How web addresses work, how attackers create convincing fakes, and how to verify any URL
Why Phishing Works on Smart People
The attacker's playbook, cognitive shortcuts they exploit, and how compromised accounts change everything
Phishing Beyond Email
Text, phone, workplace chat, social media, QR codes, and calendar-based attacks
Business Email Compromise
The five types of BEC, why technology alone can't stop it, and the processes that actually work
Becoming a Security Champion
The Security Champion Checklist and calibrated judgment for real-world scenarios
The Three Habits of a Security Champion
The Security Champion Checklist
- 1 WHO sent this? — Do I know them? Normal channel? Anything different?
- 2 WHAT are they asking? — Password, money, file, data, channel change?
- 3 WHY now? — Unusual urgency? Manufactured timing? Threats?
- 4 DOES IT MAKE SENSE? — Normal request? Normal channel? Matches processes?
If any answer feels wrong → VERIFY
The Three Habits
- 1 Pause Before Acting — Every attack depends on you acting before thinking. A two-second pause defeats most of them.
- 2 Verify Through a Separate Channel — Call, walk over, email — use a contact method you already trust, not one from the message.
- 3 Report Without Shame — Your report protects others. Security teams would rather investigate 100 false alarms than miss one real attack.