Overview/Description Target Audience Prerequisites Expected Duration Lesson Objectives Course Number Overview/Description
Every networked device we carry and use each day is a potential entry point for scammers to access sensitive information. In today's digitally connected environment it's critical to be aware of methods scammers use, and ways to protect both yourself and your organization's data. This short course covers the different types of phishing attempts that you may encounter, how they work, and what you can do to help ensure you don't become a victim to one. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.