1 hour this interactive training explains various types of social engineering, including phishing, spear phishing, whaling, smishing, and vishing. Web the public version of dod cyber exchange has limited content. To meet technical functionality requirements, this product was developed to function with windows operating systems (windows 7 and 10, when configured correctly) using either internet explorer (ie) 11, firefox 93, chrome 94, or edge 94. Web phishing and social engineering: Virtual communication awareness product functionality requirements: You must have a jko account to take this training. Users learn to recognize indicators of social engineering and the steps to take when targeted by social. You will need a common access card (cac) with dod certificates to access dod cyber exchange nipr. Virtual communication awareness training version: This course is hosted on joint knowledge online (jko).
External certificate authority (eca) certificates do not allow access to dod cyber exchange nipr. Web the public version of dod cyber exchange has limited content. Web retake phishing and social engineering: Web this group of courses has been designed to familiarize the student with basic and advanced operating system functions (windows 2003, windows xp), encryption technologies, active directory,. Web the purpose of this course is to identify what personally identifiable information (pii) is and why it is important to protect it. Users learn to recognize indicators of social engineering and the steps to take when targeted by social. The course reviews the responsibilities of the department of defense (dod) to safeguard pii, and explains individual responsibilities. Web phishing and social engineering: Selecting the launch training button will redirect you to jko. Web phishing and social engineering: The caller asks for your social security number and payment information.