Overview

You are likely to get an email that is part of a social engineering attack. You might be prompted to share a password, buy something, or transfer money. Knowing how to spot a social engineering attack makes you far less likely to fall for this common email-based attack.

After completing this online training course, students will be able to:

  • Describe how social engineering attacks work
  • Recognize a likely social engineering attack
  • Describe the common forms of social engineering attacks

Any member of an organization that utilizes email

None

  1. How to Recognize Social Engineering Attacks
  2. Social Engineering Attack: Wire Transfer
  3. Social Engineering Attack: IT Asks for your Password
  4. Social Engineering Attack: Gift Card Purchases