Search the Internet for three different phishing simulators. Take the phishing c

Search the Internet for three different phishing simulators. Take the phishing challenge on each simulator to determine if you can identify the phishing attacks. Then create a table that lists the features of the phishing simulators, their ease of use, and how accurate you think they were. Would these simulators be helpful in training users about phishing? Write a one-paragraph summary along with your table for each simulator.
INSTRUCTIONS
For each answer, please explain your reasoning.
Make sure to include your name, date, and corresponding heading information.
Ensure you check your assignment for grammar and spelling.
Be careful with plagiarism.
Remember to cite resources.