COPYRIGHT
This document is the property of the Red Snapper Group (RSG). RSG documents are to be used only for the purpose for which they are authorised and are not to be used for non RSG related activities. Users shall not make unauthorised copies of documents, except as permitted by law or by the owner of the document. Distribution to third parties is strictly forbidden.
Learning Objectives
- Understand how we identify the email sender
- Look at verifying the sender
- Understand the threats emails contain
- Indentfing the Domain
