Alert Triage
Phishing Follow-Through Response
From user report to triaged case: validate artifacts, coordinate comms templates, and close the loop with lessons learned.
- Duration
- 9 hours over 1 week
- Format
- Self-paced
- Tuition (informational)
- ₩180,000
Tuition is informational on this static site. Operational agreements happen offline with your procurement team.
Inside the lab
Walk through a respectful, privacy-aware response flow when a user forwards something suspicious. You practice validating headers safely, choosing comms templates, and capturing lessons without shaming the reporter.
What you practice
- Safe artifact handling checklist
- Comms templates with tone coaching
- Role-play prompts for user callbacks
- Customer success manager tips on empathy
Outcomes
- Run a repeatable triage checklist for reported mail
- Select appropriate comms templates by audience
- Record lessons learned in a neutral tone
Elena Marchetti
Customer success manager supporting cohort empathy and comms quality.
FAQ — two column tabs
Questions on the left cover access and scope; right column covers expectations.
Synthetic only. We never ask you to open suspicious attachments from the public internet.
We mention when to loop other teams but do not provide legal advice.
Email gateway administration and deep mail routing forensics are out of scope.
Experience notes
“The tone coaching on user callbacks was the standout. I still use the two-sentence opener.”