This course covers the threat of social engineering and how it is likely to manifest. Upon completing this course, students will be less likely to fall prey to a social engineering attack.
Curriculum
5 Sections
0 Lessons
Lifetime
Expand all sectionsCollapse all sections
01. How to Recognize Email Based Social Engineering Attacks
0
02. Verifying the Domain Name of the Sender
0
03. Social Engineering Attack: Wire Transfe
0
04. Social Engineering Attack: IT Asks for your Password
0
05. Social Engineering Attack: Gift Card Purchases