Skip to main content

Week 3: Malware

Completion requirements
View all sections of the document

This is an example of what could be a phishing email.

 2.4 Spotting a phishing email