Module 4: Recognizing and Responding to Cyber Threats Identifying phishing emails and social engineering tactics Steps to take when encountering suspicious activity Reporting procedures for cybersecurity incidents By Courses|2024-05-12T20:39:05+05:30May 12th, 2024|Cyber Awareness|0 Comments