In this course, the instructor will discuss how scammers may use charm, power, and influence to gain sensitive information from unsuspecting victims.
The instructor will discuss methods a scammer might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy a cyberattack or scam. Finally, the instructor discusses countermeasures to take to protect yourself and others from online attacks.
Mon, Apr 14 | 10:00AM to 6:00PM |
Tue, Apr 15 | 12:00PM to 8:00PM |
Wed, Apr 16 | 12:00PM to 8:00PM |
Thu, Apr 17 | 10:00AM to 6:00PM |
Fri, Apr 18 | 10:00AM to 6:00PM |
Sat, Apr 19 | 10:00AM to 6:00PM |
Sun, Apr 20 | Closed |