Chapter 2 | Approaches to Phishing In this chapter, Bob discusses how to leverage phishing as an effective training tool. Book traversal links for Chapter 2 | Approaches to Phishing ‹ Chapter 1 | Reasons to Conduct Phishing Campaigns Up Chapter 3 | Frequency and Timing ›