Skip to content

Recognizing Tech Support Scams

Provider: CeriFi Checkpoint Learning

Information Technology 0.2 CPE Credits Overview Nano Learning
Cybercriminals are constantly coming up with new ways of tricking unsuspecting people. Tech support scammers use social engineering to convince victims that their computers or financial accounts have been compromised. Once the tech support scammers gain remote control over the victims' computers, they can access the victims' financial assets.

This overview-level course provides a general review of this topic from a broad perspective. This course is appropriate for the professional at any organizational level.

Not an LCvista user, get in touch with our team to get started.

Get Started Back to Catalog