Inforum Course: Spam and Online Threats Thumbnail
‹ Back

Inforum Course: Spam and Online Threats

Internet and mobile technologies have been key drivers of the global economy over the past twenty years. These technologies impact almost every facet of our day-to-day lives and have also been integrated into almost every business model and are expanding to support egovernment, e-health and e-education. As our laptops, smartphones and tablets have become integrated into our daily personal and business lives, our dependence on these devices has grown. We use the devices to connect to family and friends, shop and bank online, engage with civic agencies and governments, interact with business colleagues and partners, access information and education opportunities and deliver just-in-time products from manufacturing facilities to retail outlets around the globe.

This course focuses on the growing use of mobility to access the Internet, the risks of becoming infected by malware, spreading botnets, redirecting Internet traffic to malicious websites, hijacking cloud and hosting services and inserting spyware onto computers and handheld devices. It shows how the risk increases and impacts countries and users who are unaware or under prepared to address the problem of spam and malicious threat. The course will provide you with a better understanding of the online and mobile threats facing governments, businesses and consumers today.

Course Objectives

  • Learn about how different types of spam can impact businesses and end users.
  • Explain the best practices that can be used to combat spam.
  • Describe the main purposes of Malware and Botnets, explore the threat situation (present and future), and discuss best practices for combating these threats.
  • Explain what phishing is, discuss the different phishing attacks cyber criminals use, and identify the variety of methods used to counter phishing.
  • Categorize Domain Name System (DNS) and Internet Protocol (IP) exploits, learn the various types of DNS/IP exploits, and outline the various technical defenses available to counter DNS/IP exploits.
  • Discuss the global rise in the use of mobile technology, provide an outline of the range of mobile threats, and cover the collaborative approach needed to combat existing and emerging mobile threats.

Who Should Attend

You should attend this course if:

  • You are interested in understanding the mobile and online threats landscape.

This course was developed to provide non-technical personal with an understanding of the threats facing businesses and consumers in the online and mobile threat environment.

What You Will Learn

The modules in this course cover:

  • Introduction: The Evolution of Online Threats
  • Malware and Botnets
  • Phishing and Social Engineering
  • Domain Name System (DNS) and Internet Protocol (IP) Exploits
  • Mobile Threats


This course was designed to not require any previous knowledge of spam and other online threats. However should there be an interest in becoming familiar with terminology used in the module, one can review materials contained in the Anti-Spam Toolkit located at 

How This Course Works

This course is available in self-paced format.  Subject matter experts are available to assist you online.

The course will be offered through Inforum, the Internet Society’s learning management system.

Course content will consist of readings, short online videos, mini-quizzes and discussions/activities.

Connect will be used to facilitate course discussions and exchanges between Chapters.

Special Thanks to the Following Contributors to the Development of this Course:

  • Niel Harper
  • Karen Mulberry
  • Toral Cowieson
  • Messaging Malware Mobile Anti-Abuse Working Group (M3AAWG)
  • London Action Plan (LAP)
  • Day One Technologies
‹ Back