Here is a handy phishing flow chart that basically walks a user through the analysis of an email. It begins by identifying the sender and then checking consecutively if the email contains links or attachments and if it requests personal information.
Flowcharts are great because they illustrate step-by-step decision paths easy to understand and follow. It’s also very handy to show family or friends who have no idea how to identify a phishing attack.