Skip to main content
Week 3: Malware
Completion requirements
View all sections of the document
This is an example of what could be a phishing email.
◄
2.4 Spotting a phishing email