Cybersecurity

Social Engineering (CS008)


Description
“You must trust and believe in people, or life becomes impossible.” So said the famous Russian writer Anton Chekhov. And, well, he had a point. Without trust, we wouldn’t form friendships or relationships. But here’s the thing, Anton: you really can’t trust everyone.

It was probably a bit different back in the 19th century what with the lack of computers and everything. But cyber tricksters and con artists are everywhere today, and they’re preying on our natural inclination to trust and help others. By pretending to be genuine, social engineering criminals manipulate people into giving away confidential and sensitive information.

By the end of this course, you’ll be able to:

• Understand the dangers of social engineering and how it works
• Recognize the different types of social engineering attacks
• Avoid becoming a victim of social engineering

Why take this course?

The majority of cyberattacks are the result of social engineering. Yet, we can reduce the chances of falling victim by spotting the signs and remembering to think before opening that attachment. This short course is suitable for everyone, particularly organizations, professionals, and social media users. So, trust this course to help you protect yourself.

10 mins | SCORM | Workbook

Content
  • Social Engineering
Completion rules
  • All units must be completed