Chapter 1 : Mail security architecture
Chapter 2 : Phishing and spoofing patterns
Chapter 3 : Policy layering
Course
No LMS account? Contact CCN office to get onboarded.
Average -
4.4★Sneha G
1 month ago
Very practical ESA setup training
I could directly apply anti-phishing and message policy controls at work.
Aman R
3 weeks ago
Strong operational focus
The incident triage and message-tracking part was especially useful.
Yes, anti-phishing controls and policy-driven response workflows are included.
Yes, the course includes practical email DLP and data protection workflows.
Yes, investigation and triage workflows are integrated in the operations modules.
Yes, completion certificate is issued after final evaluation.
Fill out the form below and our counsellor will get in touch with you shortly.
🔒 Your information is safe with us. No spam, ever.
