Business E-Mail Compromise
Internal online training in just a few steps
Get immediate operational readiness - compatible with any learning management system (LMS) or as a stand-alone solution. Interactive, with certificate, and customizable for your industry on request.
1 Select a course (and customize it)
Choose a ready-made course from mybreev and tailor the content to your industry whenever needed.
2 Integrate technically
Seamless integration into your LMS or immediate use as a stand-alone solution. Format: SCORM 1.2, xAPI, HTML5 and LTI.
3 Train interactively
Active learning through integrated quiz questions and practical exercises. Measurable learning progress in real time.
4 Issue certificates
Automatic certificate issuance after successful completion. Documentable for professional development and compliance.
Used across industries
Course content & learning objectives
Chapters
Was ist Business E-Mail Compromise (BEC)?
Angriffswege
Vorgehensweisen der Täter
Besonders gefährdete Ziele
Typische Betrugsmaschen
Warnsignale
Präventions- und Schutzmaßnahmen
Learning objectives
- Anschauliche Darstellung gängiger Betrugsangriffe
- Verschiedenen Formen des Business-E-Mail-Compromise
- Die Rolle der sozialen Medien
- Was Social Engineering ist
- Welche Ziele für Angreifer besonders wertvoll sind