Recognize, Verify, Report: Preventing Fraudulent Email Threats
This course was designed as a business solution for organizations that need employees to make safer decisions when fraudulent emails appear inside familiar workflows. Rather than relying on generic cybersecurity awareness, the course uses role-based practice for finance, payroll, HR, executive support, and managers so learners can apply verification, reporting, and escalation behaviors in realistic workplace scenarios. The project showcases my instructional design strengths in scenario-based learning, performance-focused analysis, branching decision design, simulation planning, assessment strategy, accessibility, and production-ready storyboard development.
Fraudulent email is no longer just an IT concern. It is a business-performance risk that can disrupt finance, payroll, operations, vendor relationships, employee confidence, and revenue protection.
This course is designed to help employees make safer decisions at the exact moments when a business is most vulnerable. Through realistic inbox simulations, role-based scenarios, hotspot analysis, branching decisions, and a capstone response plan, learners practice how to recognize suspicious requests, verify sensitive information through approved channels, report quickly, and escalate high-risk situations before damage occurs.
The course helps prevent lost revenue, payroll diversion, vendor payment fraud, data exposure, operational downtime, and costly incident-response activity. Instead of simply telling employees to “watch for phishing,” the course builds repeatable workplace behaviors that improve job performance and strengthen your organization’s security culture.