Phishing Attacks Detection & Analysis
Learn to detect and prevent email-based phishing attacks
Fraud Detection
Learn to identify suspicious patterns and anomalies
Risk Analysis
Master advanced analytical techniques and ML models
Investigation Procedures
Follow best practices for fraud investigation
SPF (Sender Policy Framework): Verifies that the sending mail server is authorized to send email for a specific domain.
DKIM (DomainKeys Identified Mail): Adds a digital signature to emails that can be validated to ensure the email wasn't altered in transit.
DMARC (Domain-based Message Authentication, Reporting & Conformance): Builds on SPF and DKIM to provide clear policies for handling authentication failures.
Spear Phishing: Targeted attacks against specific individuals or organizations
Clone Phishing: Duplicating legitimate emails but replacing links or attachments with malicious ones
Whaling: Targeting high-profile executives or wealthy individuals
Business Email Compromise (BEC): Impersonating executives to trick employees into transferring funds or sensitive information