We offer various training on security.
We conduct training for responding to targeted phishing emails. Targeted phishing emails are cleverly disguised and are characterized by appearing to be legitimate. It is effective to regularly repeat education to firmly grasp the points to check in emails and training to make this a habit. Please feel free to contact us if you have any requests. 【Flow of Targeted Phishing Email Response Training】 1. Pre-training 2. Sending targeted phishing emails (within the scope of our service) 3. Detection of response errors (within the scope of our service) 4. Reporting detection results (within the scope of our service) 5. Post-training 6. Questionnaire *For more details, please download the PDF or feel free to contact us.
Inquire About This Product
basic information
For more details, please download the PDF or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
For more details, please download the PDF or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
Our company provides platform services based on infrastructure design and construction, including virtualization technology, as well as various information security services such as support for obtaining information security certifications and information security diagnostics. We leverage our extensive know-how accumulated over many years to build systems that utilize IoT and drones, and we offer various SI solution services. Please feel free to contact us if you have any inquiries.