- Plastic examples to illustrate the dangers in dealing with e-mails
- Background information on the routes of infiltration of cyber criminals
- Practical tips for detecting suspicious or fake e-mail
- Helpful hints for checking a possibly faked sender address
- Comprehensible instructions for encrypting confidential e-mails
- Applicable information on private mail handling and corporate compliance More info
7 Course Chapters
Every course module you find here can be used as a short learning unit – also called Learning Nugget. Do you have any questions about the course content? – We would be glad to help you.