This Site Requires JavaScript Enabled.
Toolkits
  • IN Individuals Toolkit
  • SB Small Business Toolkit
  • ET Elections Toolkit
  • JO Journalists Toolkit
  • MBO Mission-Based Toolkit

Training

Totem Project | Phishing Attacks

May 14, 2021 | Prevent Phishing and Malware, Backup and Recover

Totem is an online platform that offers interactive courses to learn how to increase digital security and privacy. The optimal user experience is currently on your desktop computer. The aim is to support journalists, human rights defenders and activists use privacy tools and tactics more effectively in their work.

What will you learn? You should walk away from this course knowing:

  • What a phishing attack is
  • How to identify a phishing attack
  • How to prevent phishing attacks
  • What to do if you realise you’ve been phished

Click “Read More” below to go to the Totem training course.

Read More
Back to Resources
  • About
  • Community Forum
  • Submit a Tool
  • Privacy Policy
  • Terms of Service
  • Legal Notice
  • Artificial Intelligence Policy
    and Disclosure
  • Invest in Us

Copyright @ 2025 Global Cyber Alliance | Sitemap

Scroll to top

Tool Types

Third Party Scan
Video
Third Party Tool
Policy Document
Instructions

Time

“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.

Tool Levels

Level 1

Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.

Level 2

Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.

Level 3

Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.

Level 4

Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.

Support

Contact Us
[email protected]

Community Forum
https://community.globalcyberalliance.org/