๊ฐ•์˜

๋ฉ˜ํ† ๋ง

๋กœ๋“œ๋งต

Security & Network

/

Computer Security

2025 Security Incident Response Training Security Awareness Education

This is a security awareness improvement training video for the 2025 Incident Response Training conducted by the Information Security Department. This video is shared to enhance the security awareness of employees whose training evaluation grade is "Vulnerable". As the copyright of this video belongs to Gabia, redistribution in any form such as capturing or recording is strictly prohibited. We ask for the cooperation of all employees so that this valuable content can be shared safely.

(4.9) 36 reviews

40 learners

Level Beginner

Course period 1 months

  • yjlee4813
security training
security training
security training
security training

Reviews from Early Learners

4.9

5.0

๊ถŒ๋ด‰์ˆ˜

100% enrolled

Successfully delivered important content in a short time.

5.0

์ž„ํ˜์ง„

100% enrolled

Being a department that doesn't handle contracts or large payments, I was reminded of the risk of phishing emails once again on this occasion. Even if you are not in a relevant department, damage can spread to yourself, the organization, or the company just by opening one email, so I need to be very careful.

5.0

๊น€์ง€์šด

100% enrolled

It's helpful!

What you will gain after the course

  • Spam, Scam Mail Cases

  • Spam and Scam Mail Response Measures

๐Ÿ’ก What is incident response training?

  • This is a practical security training where employees respond to a cyber attack situation as if it were real.

  • Among them, spam mail training involves sending emails containing malicious links or attachments to employees to check whether they respond .


  • You can understand the email security awareness level and response capabilities of Com2uS employees in advance .



๐Ÿ’ก Why do we conduct incident response training?

  • Since most security incidents start with spam emails, prior training is very important.

  • By receiving spam emails that resemble actual attacks, employees learn to recognize suspicious signs and respond safely .


  • You can prevent mistakes in real-world situations and improve the security level of Com2uS employees .



โœ… Incident response training evaluation grade

  • Good

    • If you received an email but did not open it

  • Insufficient

    • If you have opened the email but have not run the URL link or attached file

  • Vulnerable

    • If you check the contents of the email and run one or more URL links or attachments



โœ… How to take the course and how long it takes

  • After watching both training videos, read the final instructions

  • It takes about 7 minutes


โœ… Training Structure

  • Spam, scam mail cases and countermeasures

    • What is spam and phishing email?

    • Scam mail targeting businesses! How to avoid damage?



๐Ÿ“ Key contents of the training

  • What is spam and phishing email?

    • Definition and types of spam mail

    • Phishing Email Definition

    • Phishing email personal information theft process

    • Typical phishing email examples

    • How to distinguish phishing emails



  • Scam mail targeting businesses! How to avoid damage?

    • Definition of scam mail

    • 5 stages of scam email damage

    • Tips for Avoiding Email Trade Fraud



๐Ÿ“ŒVideo ownership and redistribution prohibited

  • This training is the property and copyright of Gabia.

  • Any act of capturing, recording, downloading or copying of this educational video without prior consent is prohibited.

  • Sharing educational materials via external platforms, messengers, email, etc. is strictly prohibited.

  • Sharing accounts for classes and taking classes on behalf of others violates our internal security policy.

  • Any act of arbitrarily editing, modifying, or reprocessing the contents of the educational content is prohibited.

  • In case of violation, civil and criminal liability may be imposed according to copyright law and information protection laws.

๐Ÿ“Œ Inquiry

๐Ÿ›ก For security awareness training inquiries: Information Security Office

Recommended for
these people

Who is this course right for?

  • Staff having trouble with email security rules

  • Staff members unsure about distinguishing spam from real emails

Hello
This is

Curriculum

All

3 lectures โˆ™ (7min)

Published:ย 
Last updated:ย 

Reviews

All

36 reviews

4.9

36 reviews

  • sakrai1๋‹˜์˜ ํ”„๋กœํ•„ ์ด๋ฏธ์ง€
    sakrai1

    Reviews 1

    โˆ™

    Average Rating 5.0

    5

    100% enrolled

    Being a department that doesn't handle contracts or large payments, I was reminded of the risk of phishing emails once again on this occasion. Even if you are not in a relevant department, damage can spread to yourself, the organization, or the company just by opening one email, so I need to be very careful.

    • ygs13408616๋‹˜์˜ ํ”„๋กœํ•„ ์ด๋ฏธ์ง€
      ygs13408616

      Reviews 1

      โˆ™

      Average Rating 5.0

      Edited

      5

      100% enrolled

      Will check suspicious emails and domains well.

      • dnwogud937028๋‹˜์˜ ํ”„๋กœํ•„ ์ด๋ฏธ์ง€
        dnwogud937028

        Reviews 1

        โˆ™

        Average Rating 5.0

        5

        100% enrolled

        I also learned about scam emails, realized the potential for greater damage than expected, and felt the need to be more cautious in the future.

        • bskwon5219๋‹˜์˜ ํ”„๋กœํ•„ ์ด๋ฏธ์ง€
          bskwon5219

          Reviews 1

          โˆ™

          Average Rating 5.0

          5

          100% enrolled

          Successfully delivered important content in a short time.

          • wisegurm3181๋‹˜์˜ ํ”„๋กœํ•„ ์ด๋ฏธ์ง€
            wisegurm3181

            Reviews 1

            โˆ™

            Average Rating 5.0

            5

            100% enrolled

            It's helpful!

            Similar courses

            Explore other courses in the same field!