eLearning courses on Information Security
Business E-Mail Compromise
Business Email Compromise (BEC) digital training educates employees about the dangers of this sophisticated scam, in which attackers spoof legitimate emails to obtain money or information. Learn effective defenses to ensure security in the business environment.
- Seat Time: 25 Min.
- 2 languages
- For all employees
- 1. Vivid illustration of common fraud attacks
- 2. Different forms of a Business Email Compromise
- 3. The role of social media
- 4. What social engineering is
- 5. Which targets are particularly valuable to attackers
- Quiz questions
- Interactive elements
- Barrier-free (on request)
- including certificate of participation
- Extra assets (e.g. handout, promo video, poster)
- Mobile-optimized (optional)
- Variety of formats (e.g. video, gamification)
- Available in the LMS or via our learning platform
Business e-mail compromise (BEC) poses an increasing threat to companies of all sectors and sizes across the globe. What this term means is described in this course chapter.
Many incidents of Business Email Compromise are preceded by phishing and spear phishing. How this works is shown here.
For Business Email Compromise to work, hackers often use psychological manipulation. In this context, social engineering is explained here.
What vulnerabilities do social engineers look for and which people are particularly at risk? This course chapter explains it.
This post explains how the supplier invoice fraud and CEO fraud work and how you can protect yourself from them.
BEC attacks often have one or more specific detection characteristics. These characteristics are briefly presented in this part of the course.
BEC can be prevented through a variety of simple protective and preventive measures, which are explained in this course section.
Would you like to add your own touch to the course content?
We individualise our courses to your content and design requirements.Request now