Anti-Phishing Essentials Course

GLS’ new update to its award-winning Anti-Phishing Essentials training program with gamification provides a comprehensive dive into the latest phishing tactics and hacker strategies – the most widespread threat to cybersecurity – and its variants, including ransomware, spear phishing and business email compromise

Course Description

Based on industry data published in 2020, up to 89% of security experts cite phishing as their biggest threat to data security – and for good reason. Unlike other threats, such as unpatched systems and security misconfiguration, phishing, in all of its various forms of attack, presents an on-going critical threat & vulnerability that requires the vigilance of the entire organization, not just information security team.

GLS’ Anti-Phishing Essentials (APE) course is uniquely designed with gamification and user achievement levels to promote learner engagement and sustained behavior change. The course is an integral component in supporting an organization’s anti-phishing program by teaching what phishing is, how a phishing scam works, how to recognize a phishing email, and the basic steps an employee can take to greatly minimize the odds of becoming a victim. It includes sections devoted to other related threats such as spear phishing, ransom ware and malware attacks, as well as business email compromise (BEC) scams.

GLS’s updated Anti-Phishing Essentials course engages the user by busting common phishing myths, providing realistic examples of potential phishing emails, and using scenario-based assessment questions and also includes a final 8-question quiz.

New content for 2021

Anti-Phishing Essentials is perfect for any organization, large or small, that needs in-depth anti-phishing training and/or seeks to strengthen and enhance their company’s overall security and risk mitigation posture. This gamified training program provides:

  • Relevant information on all common types of phishing exploits
  • Hands-on problem-solving using case-study-based examples
  • A proven solution that targets learners at all levels of the organization. Using GLS’ success-based learning design through Tier challenges, this program effectively engages in-attentive employees and habitual repeat clickers within your organization.

Course Curriculum

Round 1: Phishing, Fact or Fiction?

  • Uses a gameshow format to bust common phishing myths

Round 2: Saving Sam

  • Explores the inbox of an average employee named Sam to educate users on how phishing scams work, the different forms that phishing can take (including ransomware attacks, spear phishing, BEC attacks, and text and social media messages), how to recognize a phishing message, and what basic steps to take to avoid becoming a victim

Round 3: Security Showdown

  • The final round tests the user’s knowledge of phishing by presenting an eight-question scenario-based quiz

Upon Completion, Learners will be Able to

Learn more about anti-phishing training from GLS

Please complete the form below and a GLS representative will contact you

First Name
Last Name
Job Title
Email Address
Phone Number
Organization Name
Organization Size
Product/Solution Area of Interest
GLS Logo
Front-End Exercises
React Angular Vue.js
Cross Site Request Forgery Cross Site Request Forgery Untrusted HTML Rendering XSS
Direct Dom Manipulation XSS Direct Dom Manipulation XSS Direct Dom Manipulation XSS
Components with Known Vulnerabilities Template Concatenation Cross Site Request Forgery
Untrusted HTML Rendering XSS Sanitization Misuse XSS Untrusted Template Usage XSS
GLS Logo
OWASP Top 10 – API – 2019
ID Topic Covered in SecureDev Modules Programming Languages Available
API1:2019 Broken Object Level Authorization Broken Object Level Authorization JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
API2:2019 Broken User Authentication Broken User Authentication
API3:2019 Excessive Data Exposure Excessive Data Exposure
API4:2019 Lack of Resources & Rate Limiting Lack of Resources & Rate Limiting
API5:2019 Broken Function Level Authorization Broken Function Level Authorization
API6:2019 Mass Assignment Mass Assignment
API7:2019 Security Misconfiguration Security Misconfiguration
API8:2019 Injection Injection
API9:2019 Improper Assets Management Improper Assets Management
API10:2019 Insufficient Logging & Monitoring Insufficient Logging & Monitoring
GLS Logo
OWASP Top 10 – 2021
ID Topic Covered in SecureDev Modules Programming Languages Available
A01:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
A02:2021 Cryptographic Failures Weak Randomness
A03:2021 Injection SQL Injection Command Injection Header Injection XML Injection
A04:2021 Insecure Design User Enumeration
A05:2021 Security Misconfiguration Leftover Debug Code
A06:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation
A07:2021 Vulnerable and Outdated Components Session Fixation Forced Browsing
A08:2021 Software and Data Integrity Failures Reflected XSS
Forced Browsing
Stored Cross-Site Scripting
Insecure URL Redirect
Directory Traversal
Cross-site Request Forgery
A09:2021 Security Logging and Monitoring Failures PII Data in URL
Token Exposure in URL
A10:2021 Server-Side Request Forgery (SSRF) Server-Side Request Forgery
GLS Logo

Your download is complete!

Need more training?