Intro to how to prevent phishing

With our free hands-on tutorial, you’ll learn about the many types of social engineering — baiting, phishing, spear phishing, vishing, and pretexting — and how to prevent these kinds of attacks.

Why learn how

to prevent phishing?

Better protect your information

Phishing is an extremely popular form of social engineering attack — learn how to better protect your information.


Prepare for a cybersecurity bootcamp

These lessons are the quickest way to get real hands-on experience and to learn the basics you’ll need to get into our immersive cybersecurity engineering course.

What you’ll learn:

Preventing phishing attacks isn’t easy. Even the most vigilant email users can fall victim to this social engineering technique. In this free lesson, you’ll get an introduction to social engineering and learn how to protect personal information like social security numbers, credit card numbers, and passwords.


Other free cybersecurity lessons at Flatiron School

Free Workshop

Intro to Virtualization

Learn about virtualization technology and how it enhances information security.

Free Workshop

Intro to Cryptography

Learn how to keep your communications secure using cryptography techniques like encryption.

Free workshop

Understanding IoT Security

Learn about the Internet of Things and how WiFi-enabled devices can leave you vulnerable.

Frequently asked questions about phishing

Phishing refers to an attempt to get a trusted user to betray sensitive information for profit or to gain access to more secure parts of a network. Typically, the desired information includes usernames, passwords, credit card numbers, bank account information, or other important data to utilize or sell.

By masquerading as a reputable or trusted source with a credible request or an enticing offer, an attacker lures in the victim to trick them, in the same way a fisherman uses bait to catch a fish. Anyone with an email account has experienced phishing being carried out through email.

Social engineering is the use of deception to manipulate users into divulging confidential or personal information that may be used for fraudulent purposes.

There are several techniques used in social engineering attacks including baiting, phishing, spear phishing, vishing, and pretexting. The attacks look like normal activity to build trust with the intended victim. The information gained from a successful social engineering operation may get the attacker the information or access they desire, or may simply help them to breach a further layer of security in a well-layered security environment.

A phishing email is usually when someone sends an email that appears to originate from a reputable source with an enticing request. The attacker lures the victim in by inspiring confidence and then tricks them into providing sensitive information.

A phishing attack is when someone posing as a reputable source sends you an email attempting to gain private information about you or your organization.

Everyone should learn about phishing to avoid becoming a victim of an attack. Knowing what to look for can also help prevent phishing attacks against companies. Cybersecurity professionals may be called upon to train others to recognize phishing attacks.

Yes, How to Prevent Phishing is entirely free, just like the rest of our tutorials.

If you want to learn how to prevent phishing attempts and becoming a victim of phishing, this is the perfect place to start your education.