Master email authentication and security with our free, self-paced courses. From DMARC basics to advanced deliverability strategies.
Learn the foundations of email authentication. This beginner-friendly course covers SPF, DKIM, and DMARC from the ground up, giving you everything you need to publish your first DMARC record and start protecting your domain.
Go beyond the basics with advanced SPF record management. Learn the syntax in depth, master the 10-lookup limit, explore flattening techniques, and avoid the most common SPF mistakes that break email deliverability.
Master DKIM signing, key generation, selector management, alignment, and key rotation. This intermediate course gives you hands-on knowledge for deploying and maintaining DKIM across your email infrastructure.
Learn how to display your brand logo next to your emails with Brand Indicators for Message Identification (BIMI). This course covers VMC certificates, SVG requirements, DNS records, and the prerequisites for BIMI deployment.
Master the art and science of getting your emails into the inbox. This advanced course covers email filtering systems, IP reputation, authentication impacts on deliverability, monitoring techniques, and proven strategies for avoiding the spam folder.
A concise, non-technical overview of email security designed for executives, managers, and decision-makers. Understand the threats, learn to read reports, and build a practical security strategy for your organization.
DNS is the backbone of email authentication. This intermediate course covers DNS record types critical for email, DNSSEC fundamentals, DNS monitoring strategies, and common DNS attacks that threaten email security.
Secure the transport layer of your email with MTA-STS (Mail Transfer Agent Strict Transport Security) and gain visibility into encryption failures with TLS-RPT. This course covers the what, why, and how of both protocols.
Learn to proactively identify and respond to email-borne threats. This advanced course covers phishing detection, brand impersonation analysis, IP reputation intelligence, and building an effective threat response playbook.
A structured, advanced guide to progressing from DMARC monitoring to full enforcement. Learn the audit phase, quarantine rollout, reject deployment, and ongoing maintenance strategies for sustaining p=reject at scale.