Proofpoint Certified Phishing Specialist | Completion Deadline is Monday, Dec. 9th at 5 pm PT / 8 pm ET
Back by popular demand: our complimentary Proofpoint Certified Phishing Specialist certification is now available on-demand! Enroll today for free.
Phishing threats continually evolve to bypass security programs and human detection, and it only takes one person to fall for phishing to incite a severe data breach. So how do you remain aware and protected in the changing phishing landscape? How do you educate your employees to recognize the warning signs and avoid revealing sensitive information?
Our Certified Phishing Specialist program is designed to train you on the latest trends and tactics used in modern phishing attacks, provide valuable insight into phishing prevention, and demonstrate how Proofpoint’s human-centric approach can help you better protect your company.
Register and watch three 1-hour courses, pass the exam at the end of each course, and earn your certificate! We will issue completed certificates the beginning of November and December.
*This track is intended for all levels of cybersecurity administration roles. These are NOT technical training sessions. All courses are eligible for CPE credits through ISC(2).
Course 1
Anatomy of the Phish – Breaking Down the Latest Phishing Attacks
The migration to working from home has forced many security teams to drastically change their defensive strategies to protect end users. In response, threat actors have become more devious, more targeted, and more highly motivated to compromise your sensitive data.
Attackers are working harder than ever, using new methods and new bait to lure and hook their victims. You’ll learn from the most recent real-world examples of phishing attacks seen by Proofpoint, which utilize Microsoft office collaboration tools and OAuth permissions, TOAD (telephone-oriented attack delivery) methods, text messages, PhaaS supply chains and others. By understanding the way phishers operate, you’ll be better prepared to recognize and combat attacks when they occur in your organization.
In the 1st session of the Phishing certification course, we will discuss:
- How phishing has evolved in the last several years
- Modern phishing techniques including BEC/EAC, advanced social engineering, and more
- Recent examples of phishing attacks seen in the wild
- Phishing trends to watch out for in the future
Course 2
Built to Scale – Creating a Platform for Phishing Prevention
As you’ll learn in our first session, phishing emails come in a variety of forms and flavors, with advanced features designed to bypass even the most cutting-edge security solutions. It’s no surprise then, that phishing attacks like business email compromise are incredibly costly.
Modern threat actors have created entire platforms in hopes of completing a single successful attack. To protect your users and secure all your organization’s potential threat vectors, you need a platform of your own.
Building a layered security approach with multiple attack stop-gaps and fail-safes is especially crucial to stopping phish. Learn how phishing attacks rely on, and take advantage of various technologies employed by your end users, and how to implement more adaptive controls to reduce your overall attack exposure.
In the 2nd session of the Phishing certification course, we will discuss:
- How a phishing attack can move through your network
- Identifying phishing vulnerabilities within your security infrastructure
- Why and how to build a layered security approach against phishing
Course 3
Human Firewall— Prepping Your Users to Fight Phishing
People are the primary target of cybercriminals. And it only takes one person to fall for phishing to incite significant financial loss or a severe data breach. Organizations struggle to improve users’ learning retention and detection efficacy with their current security awareness programs. To fight phishing, you need to empower users with the right knowledge and tools, so they can become a strong last line of defense.
Join us for our 3nd session of the Phishing certification course as we will discuss:
- How phishing has impacted various industries
- The challenges with security awareness training
- Best practices for educating your end users
- How to measure behavior change
FAQs
Keep in mind that in order to be able to take the exams, you must use a business email. Please do not register with a personal email such as those with the domain “gmail” or “yahoo.”
Please consistently use the same email you registered with throughout the program to ensure the accuracy of tracking your attendance towards getting certified.
After filling out the form on this page to enroll in our certification program, you will receive an email from us confirming your spot reservation. We will send you separate emails within 3-5 business days for you to log in to our Cybersecurity Academy training platform to access your recordings and exams. Please double check your spam folder and email security settings for these emails.
To pass a course, you would have to watch at least 80% of the on-demand recordings for all three sessions and take the three exams. You need to score 100% on each exam to pass the course. You will have unlimited attempts to take your exams.
You have unlimited attempts to take the exams to get 100% scores to pass the courses.
You will have until Monday, Dec. 9th, 2024 at 5 PM PT to access the course recordings and exams to complete your certification.
Each session is about 1 hour long. Each exam will be about 15 minutes.
The Cybersecurity Leadership courses and certifications are free.
Yes. You are required to watch at least 80% of all three sessions to be eligible for your certification in addition to passing all of your exams.
The exam(s) will automatically be available to you on the training platform AFTER you've completed the required session(s).
If you are running into problems logging into the Proofpoint training platform, please go to account.adobe.com. You'll create an account using the same email address you used to enroll in this course, and then you'll be able to access the course modules. If you're still running into issues try: 1) creating your account in an incognito window or a different browser, 2) create an account on a personal computer without company policy restrictions, and/or 3) clear your cache, log out and log back in again.
The deadline for the Phishing certification completion is Monday, Dec. 9th at 5 pm PT. We will review all the submissions and issue all eligible certificates/badges via Credly once at the beginning of November and one more time at the beginning of December. If you've completed your requirements on time, you will receive an email from Credly once we've issued your certificate, at which point you can login to your Credly account to accept your certificate of completion.
Currently we are not offering any renewals of previous badges and certificates. Once we open renewals back up again, we'll notify you via email.
We will submit all certificates to ISC2 for three CPE credits at the first week of October 7th after we've issued all Credly certificates for DLP for those who have entered in their ID number at the point of registration. If you did not enter your ISC2 ID at the point of registration or is not a member, then you may take your digital certificate from Credly and send it to ISC2 yourself or apply it another organization you may be affiliated with for three credits.