In this course, the instructor will discuss how scammers may use charm, power, and influence to gain sensitive information from unsuspecting victims.
The instructor will discuss methods a scammer might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy a cyberattack or scam. Finally, the instructor discusses countermeasures to take to protect yourself and others from online attacks.
| Mon, Jan 19 | Closed |
| (MLK Day) | |
| Tue, Jan 20 | 10:00AM to 8:00PM |
| Wed, Jan 21 | 10:00AM to 8:00PM |
| Thu, Jan 22 | 10:00AM to 6:00PM |
| Fri, Jan 23 | 10:00AM to 6:00PM |
| Sat, Jan 24 | 10:00AM to 6:00PM |
| Sun, Jan 25 | Closed |
