You are likely to get an email that is part of a social engineering attack. You might be prompted to share a password, buy something, or transfer money. Knowing how to spot a social engineering attack makes you far less likely to fall for this common email-based attack.
Overview
COURSE INSTRUCTOR
COURSE DIFFICULTY
COURSE DURATION
36m
Skills Learned
After completing this online training course, students will be able to:
Describe how social engineering attacks work
Recognize a likely social engineering attack
Describe the common forms of social engineering attacks
Any member of an organization that utilizes email
None
01. How to Recognize Social Engineering Attacks
02. Social Engineering Attack: Wire Transfer
03. Social Engineering Attack: IT Asks for your Password
04. Social Engineering Attack: Gift Card Purchases
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Describe how social engineering attacks work
Recognize a likely social engineering attack
Describe the common forms of social engineering attacks
WHO SHOULD ATTEND
Any member of an organization that utilizes email
PREREQUISITES
None
COURSE OUTLINE
01. How to Recognize Social Engineering Attacks
02. Social Engineering Attack: Wire Transfer
03. Social Engineering Attack: IT Asks for your Password
04. Social Engineering Attack: Gift Card Purchases