This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Ultimate Social Engineering Prevention
Introduction
What is Social Engineering? (2:54)
Is it Really a Problem? (2:13)
Knowledge Checkpoint
Email Safety
How Email Is Used (3:06)
Spam (10:52)
Phishing (21:02)
Spear Phishing (13:18)
Knowledge Checkpoint
Phone Based Attacks
Phone Specific Techniques (1:24)
Phone Scams (3:02)
Phone Scams - Examples and Best Practices
Vishing (1:01)
Vishing - Examples and Best Practices
Smishing (3:53)
Smishing - Examples and Best Practices
Knowledge Checkpoint
In-Person Tactics
What is In-Person Social Engineering? (1:43)
Impersonation (7:19)
USB Drop (2:39)
USB Drop - Examples and Best Practices
Knowledge Checkpoint
Wrap-Up
Course Survey
Terms Used in Course
Statistic Sources
Reference List
Knowledge Checkpoint
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock