Education • Practice • Safer Habits
Phishing Training Center
Learn how scams really work across email, text messages, phone calls, fake websites, social platforms, and other common attack paths. Each module is built to help you spot warning signs faster and respond more safely.
Start with Email • Then SMS • Then Phone
Built to teach practical scam recognition without technical overload
Learn the most common ways scammers reach people
Practice with realistic patterns and short modules
Build habits that help before urgency takes over
Best place to start: complete Email, SMS, and Phone first. Those three modules cover the majority of everyday phishing and scam attempts.
Create an account to save progress
You can browse training now, then sign in later to track completions and build your training path.
Start here (most effective)
The fastest, strongest training path is simple: Email → SMS → Phone. Those three modules will help most people block the majority of real-world attacks quickly.
Quick start
A simple 3-step training path for the highest-impact protection first.
Recommended Path
If you only have time for a few modules right now, do these in order. They build a strong base before you move into websites, business fraud, romance, investment, or other scam types.
1
Email
Learn sender tricks, fake login pages, attachments, and urgent account messages.
High-impact
Core habit builder
2
SMS
Spot short links, package bait, account warnings, and text-based urgency.
High-impact
Core habit builder
3
Phone
Recognize pressure tactics, impersonation, and one-time passcode theft by phone.
High-impact
Core habit builder
Simple rule: if a message creates urgency and asks you to click, call, log in, or pay, that pattern belongs in your training path.
Core training modules
These are the main delivery channels scammers use to reach people.
Core channels
Most common
Email Phishing
Spoofed senders, fake login pages, attachments, urgent account alerts.
Fast-growing
SMS / Text Phishing
Delivery scams, account warnings, short links, and “verify now” texts.
High pressure
Phone Call Phishing
Impersonation, one-time passcodes, “bank fraud,” and “tech support” calls.
Fake sites
Websites & Social
Look-alike sites, fake support pages, DMs, and malicious downloads.
QR traps
Mail / Physical
Fake invoices, QR traps, threats, and “official” looking letters.
Scam scenario modules
These cover the storylines and tactics scammers use across any channel.
Real-world scenarios
Bait offers
Advertisement Scams
Popups, “you won” offers, sketchy checkout pages, and bait ads.
Emotional
Romance Scams
Fast bonding, excuses to avoid meeting, and requests for money or crypto.
High loss
Investment & Crypto
Guaranteed returns, fake platforms, withdrawal blocks, and fake “fees.”
BEC / invoices
Business & Vendor Fraud
Invoice fraud, executive impersonation, payment changes, and BEC tactics.
New trends
Other & Emerging
Multi-channel pressure, new variations, and evolving scam patterns.
Built for real people
Short, practical training that helps without overwhelming people with jargon.
Useful for organizations
Helpful for employees, teams, and awareness-building across a company.
Designed for outreach
Strong fit for workshops, presentations, and community scam awareness efforts.