This course was created by DISA and is hosted on CDSE's learning management system STEPP. This course does not have a final exam.

Description: This course provides an explanation of what phishing is, as well as examples of the different types of phishing.  It also provides guidelines to help individuals recognize phishing attempts so that appropriate actions can be taken to avoid these attacks and their consequences.  It explains that phishing is a serious, high-tech scam and system users are the best line of defense against phishing.  Further, it illustrates why users should always be on the lookout for phishing attempts even from people from within their organization.

Course Resources: N/A

Learning Outcomes:
This course is designed to enable students to:

  • Describe social engineering and the methods and types of phishing attacks
  • Describe methods of phishing, introduce phishing terms, and identify information phishers are seeking and the consequences of falling for a phishing attack
  • Determine the steps to take when targeted by a phishing attempt

Delivery Method:  eLearning

Length: 30 minutes

Target audience: Department of Defense (DoD) information system users and other U.S. Government personnel and contractors within the National Industrial Security Program

Number of Student per Course: N/A

Requirements:

  • Clearance Requirement: N/A
  • Attendance Requirement: N/A
  • Exam Requirements: N/A

Prerequisites: N/A

Credits Recommended/Earned

  • ACE Credit Recommendation: (What's this?) N/A
  • Continuing Education Units per IACET: N/A
  • Professional Development Units per SPeD:

Additional System Requirements: Check if your system is configured appropriately to use STEPP.


CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program.