Overview
You are likely to get an email that is part of a social engineering attack. You might be prompted to share a password, buy something, or transfer money. Knowing how to spot a social engineering attack makes you far less likely to fall for this common email-based attack.
After completing this online training course, students will be able to:
- Describe how social engineering attacks work
- Recognize a likely social engineering attack
- Describe the common forms of social engineering attacks
Any member of an organization that utilizes email
None
- How to Recognize Social Engineering Attacks
- Social Engineering Attack: Wire Transfer
- Social Engineering Attack: IT Asks for your Password
- Social Engineering Attack: Gift Card Purchases