We use cookies to analyze our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information you have provided to them or that they have collected based on your use of their services. Read how we use cookies and how you can manage them by clicking on "Preferences".

Privacy Preferences

When you visit our website, the website may store or retrieve information via your browser, usually in the form of cookies. Since we respect your right to privacy, you can choose not to allow the collection of data from certain types of services. However, not allowing these services may affect your experience.


Intellectual property

This course is about the evolution of phishing to increasingly sophisticated forms, where cybercriminals use new technologies and psychological techniques to deceive victims. In addition to traditional phishing, I will discuss other forms such as spear phishing, CEO fraud, voice phishing and video phishing. AI technologies such as voice and video cloning in particular significantly increase the danger, as they enable extremely realistic and convincing attacks.