We may earn an affiliate commission when you visit our partners.
Tyler Hudak and Aaron Rosenmund

This course will teach you to prevent, detect, and when you must, respond to Business Email Compromise cyber attacks.

Read more

This course will teach you to prevent, detect, and when you must, respond to Business Email Compromise cyber attacks.

Though not technically malware in the sense of a malicious executable running on your systems, business email compromise is just as dangerous. Leveraging the cloud based email solutions that we have come to rely on, this family of cyber attacks has become more advanced and is responsible for billions of dollars in losses. In this course, Business Email Compromise, you’ll learn how these attacks work, who they target, and various techniques attackers use to leverage email compromise access to steal money and impersonate their victims. By the end of this course, you will learn effective and practical actions you can take to prevent, detect, and if required, respond to a business email compromise attack.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Business Email Compromises: Prevention, Detection, and Response

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Delves into business email compromise attacks, a prevalent cyberthreat causing significant financial losses
Taught by Tyler Hudak and Aaron Rosenmund, experts in information security and cybercrime
Provides practical techniques to prevent, detect, and respond to business email compromise attacks
May require prior knowledge in cybersecurity or information technology for optimal comprehension

Save this course

Save Business Email Compromise to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Business Email Compromise with these activities:
Volunteer with a Cybersecurity Non-Profit Organization
Volunteering can provide practical experience and insights into the real-world applications of BEC prevention.
Show steps
  • Identify a cybersecurity non-profit organization.
  • Contact the organization and inquire about volunteer opportunities.
Review Spear Phishing Techniques
Understanding different spear phishing techniques can help learners identify and mitigate risks.
Show steps
  • Read articles and watch videos about spear phishing techniques.
  • Practice identifying spear phishing emails using online exercises or simulations.
Join an Online BEC Study Group
Engaging with peers can enhance understanding and provide diverse perspectives on BEC prevention.
Show steps
  • Identify or create an online BEC study group.
  • Participate in discussions and share insights with other members.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Complete Phishing Security Simulations Exercises
Simulations will provide reinforcement of the lessons presented in the course.
Browse courses on Phishing
Show steps
  • Set up a secure environment to run the simulations.
  • Review the phishing email exercises and examples.
  • Complete the simulations and report on the results.
Conduct Domain Spoofing Detection Exercises
Conducting exercises will help learners apply their knowledge and develop skills in detecting domain spoofing attacks.
Browse courses on Security Analysis
Show steps
  • Set up a lab environment to simulate domain spoofing attacks.
  • Analyze email headers and other indicators to identify spoofed domains.
  • Report on the results of the exercises and make recommendations for improvement.
Create an Infographic on BEC Prevention Techniques
Creating an infographic will help learners visualize and remember key BEC prevention techniques.
Browse courses on Infographics
Show steps
  • Research and gather information on BEC prevention techniques.
  • Design and create the infographic using a tool like Canva or Visme.
Design and Implement a BEC Awareness Training Program
Creating a training program will help learners develop and deliver effective BEC awareness training.
Browse courses on Security Training
Show steps
  • Identify the target audience and their training needs.
  • Develop the training materials, including presentations, exercises, and simulations.
  • Deliver the training program to the target audience.

Career center

Learners who complete Business Email Compromise will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for monitoring and analyzing security data to identify and respond to threats. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Information Security Analyst
An Information Security Analyst is responsible for providing strategic direction on the design, implementation, and day-to-day execution of enterprise-wide security programs. Business Email Compromise is a type of cyber attack that can lead to financial losses and reputational damage for businesses. This course will teach you how to prevent, detect, and respond to these attacks, which may help you succeed as an Information Security Analyst.
Information Security Manager
An Information Security Manager is responsible for developing and implementing security policies and procedures to protect an organization's IT systems and data. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Security Consultant
A Security Consultant advises clients on how to improve their security posture and protect themselves from cyber attacks. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Security Architect
A Security Architect designs and implements security solutions to protect an organization's IT systems and data. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
IT Auditor
An IT Auditor evaluates an organization's IT systems and processes to ensure that they are secure and compliant with regulations. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Security Engineer
A Security Engineer designs, implements, and maintains security solutions to protect an organization's IT systems and data. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Network Security Engineer
A Network Security Engineer designs and implements security solutions to protect an organization's network infrastructure. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Incident Responder
An Incident Responder responds to security incidents and helps to restore normal operations. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Malware Analyst
A Malware Analyst analyzes malware to identify its capabilities and develop countermeasures. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Forensic Analyst
A Forensic Analyst investigates security incidents and provides evidence to law enforcement. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for developing and implementing an organization's security strategy. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
IT Manager
An IT Manager is responsible for managing an organization's IT infrastructure and staff. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Network Administrator
A Network Administrator manages and maintains an organization's network infrastructure. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.
Systems Administrator
A Systems Administrator manages and maintains an organization's IT systems and infrastructure. This course will teach you how to prevent, detect, and respond to Business Email Compromise attacks, which can help you succeed in this role.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Business Email Compromise.
Provides insights into the psychology of deception and how it is used in cyber attacks. It valuable read for anyone who wants to understand how to protect themselves from business email compromise.
Provides a comprehensive overview of security engineering principles. It valuable resource for anyone who wants to learn more about the topic, including how to protect against business email compromise.
Provides a practical guide to penetration testing. It valuable resource for anyone who wants to learn more about the topic, including how to protect against business email compromise.
Provides a comprehensive overview of social engineering. It valuable resource for anyone who wants to learn more about the topic, including how to protect against business email compromise.
Provides a fascinating account of the investigation of a computer espionage case. It valuable resource for anyone who wants to learn more about the topic, including how to protect against business email compromise.
Provides a fascinating account of the life of Kevin Mitnick, one of the world's most famous hackers. It valuable resource for anyone who wants to learn more about the topic, including how to protect against business email compromise.
Provides a comprehensive overview of the history of cryptography. It valuable resource for anyone who wants to learn more about the topic, including how to protect against business email compromise.
Provides a comprehensive overview of cryptography and network security. It valuable resource for anyone who wants to learn more about the topic, including how to protect against business email compromise.
Provides a comprehensive overview of network security. It valuable resource for anyone who wants to learn more about the topic, including how to protect against business email compromise.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Business Email Compromise.
Incident Investigation with IBM Security QRadar
Most relevant
OS Analysis with The Sleuth Kit & Autopsy
Most relevant
Threat Hunt with IBM Security QRadar
Most relevant
OS Analysis with Wazuh 4
Most relevant
Threat Intelligence: The Big Picture
Most relevant
Operations and Incident Response for CompTIA Security+
Most relevant
IoT Device Security: Executive Briefing
Most relevant
Check Point Jump Start: Harmony Mobile
Configuring and Managing SPF, DKIM, and DMARC
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser