Students will learn how whalers conduct reconnaissance.
- [Instructor] Attackers have all the time…they need to do reconnaissance…and plan how they will attack their target.…Attackers may take months to research and set up an attack.…Attacks may be launched at specific times…like during tax season,…or when a company's under stress like during an acquisition.…One key to success is to research the company…and identify the individuals who will be attacked.…Identify their positions and find the best tactic to use…for success with each individual.…It is also important to know the motives…of the hackers using whaling to achieve their objectives.…
Financial gain is typically the primary objective,…but there are other reasons to attack businesses.…Hacktivism is the act of hacking…or breaking into a computer system…for a politically or socially-motivated purpose.…There is an international group of hackers…known as Anonymous who have targeted…and successfully harmed many organizations.…Sometimes the ultimate goal of hackers…is to just embarrass a company by defacing their website…
Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is phishing?
- Types of phishing, including cat phishing, spear phishing, and vishing
- Phishing examples
- What is whaling?
- How to reduce phishing and whaling with technology and procedures