From the course: How to Conduct a Phishing Email Investigation
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Solution: Putting it all together
From the course: How to Conduct a Phishing Email Investigation
Solution: Putting it all together
(upbeat music) - [Instructor] Now that you've had time to work on a challenge, let's dive into the solutions. First, let's take a look at the sender's email address. Fraudsters often use email addresses that seem legitimate but have subtle differences. But this email sender is a generic Gmail account but it's claiming to be a part of a fictional company, your bank. Next, let's examine the email's tone. The first line states that access is restricted until the user verifies their information by clicking the link. This is a common tactic scammers use to make you panic and act hastily. You can also notice that there is generic greetings. While there are no spelling or grammatical errors that's not as important because that's low-hanging fruit and any spell check like service can correct that such as Grammarly. Despite claiming to never ask for personal information in the text, it's also asking you to click the link. They…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.