Though not technically malware in the sense of a malicious executable running on your systems, business email compromise is just as dangerous. Leveraging the cloud based email solutions that we have come to rely on, this family of cyber attacks has become more advanced and is responsible for billions of dollars in losses. In this course, Business Email Compromise, you’ll learn how these attacks work, who they target, and various techniques attackers use to leverage email compromise access to steal money and impersonate their victims. By the end of this course, you will learn effective and practical actions you can take to prevent, detect, and if required, respond to a business email compromise attack.
Tyler Hudak has more than 15 years of experience performing malware analysis, computer forensics, and incident response for multiple organizations. He loves sharing the knowledge he has gained on these topics in his presentations and classes!
Course Overview Hey, everyone. I'm Tyler Hudak, and I'm a professional incident responder that has worked dozens of investigations, including business email compromises. And I'm Aaron Rosenmund, a full‑time author and security researcher with Pluralsight, with a broad experience in both defensive and offensive cybersecurity. Business email compromises, while not technically malware, still revolve around live criminal actors leveraging technology to steal organizations' information and money. This is a big problem, which can affect any company. Reported losses are over one billion a year and, as with most other types of cybercrime, are still rising. Though it's not typical malware and it is more frequently taking place solely in the cloud email environments, but that's exactly what makes it so dangerous and effective. Fortunately, there are a number of ways that organizations can prevent, detect, and respond to business email compromise. I hope you'll join us for this course on Business Email Compromise on Pluralsight