This course covers the threat of social engineering and how it is likely to manifest. Upon completing this course, students will be less likely to fall prey to a social engineering attack.
Overview
COURSE INSTRUCTOR
COURSE DIFFICULTY
Skills Learned
After completing this online training course, students will be able to:
Describe a social engineering attack
Identify if the sender of an email is being spoofed
Recognize common forms of social engineering attacks
All members of an organization
None
01. How to Recognize Email Based Social Engineering Attacks
02. Verifying the Domain Name of the Sender
03. Social Engineering Attack: Wire Transfer
04. Social Engineering Attack: IT Asks for your Password
05. Social Engineering Attack: Gift Card Purchases
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Describe a social engineering attack
Identify if the sender of an email is being spoofed
Recognize common forms of social engineering attacks
WHO SHOULD ATTEND
All members of an organization
PREREQUISITES
None
COURSE OUTLINE
01. How to Recognize Email Based Social Engineering Attacks
02. Verifying the Domain Name of the Sender
03. Social Engineering Attack: Wire Transfer
04. Social Engineering Attack: IT Asks for your Password
05. Social Engineering Attack: Gift Card Purchases