Overview

This course covers the threat of social engineering and how it is likely to manifest. Upon completing this course, students will be less likely to fall prey to a social engineering attack.

COURSE INSTRUCTOR: Raymond Lacoste
COURSE DIFFICULTY: Beginner

After completing this online training course, students will be able to:

  • Describe a social engineering attack
  • Identify if the sender of an email is being spoofed
  • Recognize common forms of social engineering attacks

All members of an organization

None

01. How to Recognize Email Based Social Engineering Attacks
02. Verifying the Domain Name of the Sender
03. Social Engineering Attack: Wire Transfer
04. Social Engineering Attack: IT Asks for your Password
05. Social Engineering Attack: Gift Card Purchases