Phishing Awareness Training

Learn to identify and avoid phishing attacks by analyzing real-world examples.

Common Phishing Examples

Click on the suspicious elements in the emails below to see why they are red flags.

Advanced Tailored Phishing

See how attackers use public information to craft highly convincing emails. Click the highlighted parts to see how the email was tailored to the victim.