Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Business Email Compromise

This course will teach you to prevent, detect, and when you must, respond to Business Email Compromise cyber attacks.

Aaron Rosenmund - Pluralsight course - Business Email Compromise
by Aaron Rosenmund
Tyler Hudak - Pluralsight course - Business Email Compromise
by Tyler Hudak

What you'll learn

Though not technically malware in the sense of a malicious executable running on your systems, business email compromise is just as dangerous. Leveraging the cloud based email solutions that we have come to rely on, this family of cyber attacks has become more advanced and is responsible for billions of dollars in losses. In this course, Business Email Compromise, you’ll learn how these attacks work, who they target, and various techniques attackers use to leverage email compromise access to steal money and impersonate their victims. By the end of this course, you will learn effective and practical actions you can take to prevent, detect, and if required, respond to a business email compromise attack.

Table of contents

About the authors

Aaron Rosenmund - Pluralsight course - Business Email Compromise
Aaron Rosenmund

Aaron M. Rosenmund is a cyber security operations subject matter expert, with a background in federal and business defensive and offensive cyber operations and system automation.

More Courses by Aaron
Tyler Hudak - Pluralsight course - Business Email Compromise
Tyler Hudak

Tyler Hudak has more than 15 years of experience performing malware analysis, computer forensics, and incident response for multiple organizations. He loves sharing the knowledge he has gained on these topics in his presentations and classes!

More Courses by Tyler