BaşlayınÜcretsiz Başlayın

Could this be phishing?

Our data defender has reached the door out of the Digital Deception Zone and is met by Agent Trickster. To get out and pass to the next level, she must correctly identify Phishing. Can you help her?

Review the various elements typically found in Phishing messages and decide if they refer to checking the language, content, or sender of the message.

Bu egzersiz

Introduction to Data Security

kursunun bir parçasıdır
Kursu Görüntüle

Uygulamalı interaktif egzersiz

İnteraktif egzersizlerimizden biriyle teoriyi pratiğe dökün

Egzersizi başlat