Skip to main content

Section outline

  • Email Spoofing & Authentication
    • SPF, DKIM, and DMARC
    • Defending against phishing & impersonation attacks
    Malicious Attachments & URLs
    • Email threat analysis & detection techniques
    • Identifying and mitigating malicious URLs
    Advanced Email Security Controls
    • User awareness training with phishing simulators
    • Multi-Factor Authentication (MFA) & Conditional Access policies
    Responding to Email Attacks
    • Incident response for email-based threats