Phishing continues to be one of the most common methods used by cybercriminals to exploit users and gain access to sensitive information. These attacks rely on manipulation rather than technical breaches, making human awareness the first line of defense. This course is designed to build practical knowledge about how phishing works, how to recognise the warning signs, and how to take simple, effective steps to stay protected.
This course explores the techniques, tactics, and psychology behind phishing attacks. It covers how deceptive emails and fake websites are crafted to look legitimate, how users are manipulated into revealing personal or financial information, and what actions can be taken to avoid falling victim. You will examine how phishing campaigns use urgency, trust, and reward to trigger responses, and how to assess digital communication for signs of fraud.
The content also includes practical guidance on steps you can take to stay protected, such as inspecting suspicious messages, using two-factor authentication, keeping software updated, and installing security tools. With real-world examples and interactive scenarios, the course develops both awareness and action-oriented habits for digital safety.
Email risk detection
Website inspection techniques
Critical thinking in digital communication
Account and device security setup
Prevention strategies for online fraud
Detect suspicious emails, links, and websites with greater confidence
Respond appropriately when encountering potential phishing content
Strengthen digital hygiene by applying security best practices
Protect personal and professional data through informed decisions
Interactive case-based scenarios
Self-paced structured lessons
End-of-course assessment
Deloitte certified e-certificate upon completion
Lessons
Introduction
1 Section10 minutes
This module focuses on one of the most widespread and evolving cybersecurity threats—phishing. The objective is to build practical awareness around how these deceptive campaigns operate, why they’re so effective, and how individuals can stay alert in their everyday digital interactions.
1 reading
Identify phishing emails
1 Section20 minutes
Phishing relies on human psychology more than technical flaws. Instead of hacking systems, attackers manipulate trust. By posing as legitimate sources, they craft emails and messages that appear credible—pressuring individuals to act quickly or reveal sensitive information. These tactics exploit fear, curiosity, urgency, and convenience, often catching people off guard. Understanding how phishing emails are structured, how they evolve, and what signs to look for is critical to staying protected in any digital environment.
1 assignment
Protect yourself against phishing emails
1 Section40 minutes
Phishing protection depends on a combination of digital hygiene and personal vigilance. While awareness of threats is important, it is equally critical to take concrete steps that make it harder for attackers to succeed. These include securing devices, managing authentication, staying updated, and responding correctly when suspicious emails appear. Knowing what to do and doing it consistently can significantly reduce the risk of falling victim to phishing campaigns.
1 reading
Conclusion
2 Sections1 minute
We encourage you to stay vigilant and continue applying the knowledge you have gained to protect yourself and others from falling victim to phishing attacks.