Social Engineering

Discover how social engineering works in information security, and how you can protect yourself from attacks by cybercriminals.

$ 9 USD

Discover how social engineering works in information security, and how you can protect yourself from attacks by cybercriminals.

$ 49 USD

Learn about Network Infrastructure Security, how to install preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.

$ 299 USD

Unlimited access to all courses, learning resources and collections with new content at no additional cost for a full year.

Courses: 
1
14
328
Lessons: 
4
60
1,417
Resources: 
Workbook
Workbooks+
Multiple
Duration: 
10 minutes
175 minutes
Multiple
Access: 
30 days
60 days
12 months
Optimized for mobile

About

“You must trust and believe in people, or life becomes impossible.” So said the famous Russian writer Anton Chekhov. And, well, he had a point. Without trust, we wouldn’t form friendships or relationships. But here’s the thing, Anton: you really can’t trust everyone.

It was probably a bit different back in the 19th century what with the lack of computers and everything. But cyber tricksters and con artists are everywhere today, and they’re preying on our natural inclination to trust and help others. By pretending to be genuine, social engineering criminals manipulate people into giving away confidential and sensitive information.

What will you learn

The majority of cyberattacks are the result of social engineering. Yet, we can reduce the chances of falling victim by spotting the signs and remembering to think before opening that attachment. This short course is suitable for everyone, particularly organizations, professionals, and social media users. So, trust this course to help you protect yourself.

  1. What are the dangers of social engineering and how does it work
  2. How to recognize the different types of social engineering attacks
  3. How to avoid becoming a victim of social engineering

Infrastructure Cybersecurity collection

“You must trust and believe in people, or life becomes impossible.” So said the famous Russian writer Anton Chekhov. And, well, he had a point. Without trust, we wouldn’t form friendships or relationships. But here’s the thing, Anton: you really can’t trust everyone.

It was probably a bit different back in the 19th century what with the lack of computers and everything. But cyber tricksters and con artists are everywhere today, and they’re preying on our natural inclination to trust and help others. By pretending to be genuine, social engineering criminals manipulate people into giving away confidential and sensitive information.

Other courses in this collection

Learn about Network Infrastructure Security, how to install preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.

$ 9 USD

Discover how social engineering works in information security, and how you can protect yourself from attacks by cybercriminals.

$ 49 USD

Learn about Network Infrastructure Security, how to install preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.

$ 299 USD

Unlimited access to all courses, learning resources and collections with new content at no additional cost for a full year.

Courses: 
1
14
328
Lessons: 
4
60
1,417
Resources: 
Workbook
Workbooks+
Multiple
Duration: 
10 minutes
175 minutes
Multiple
Access: 
30 days
60 days
12 months
Optimized for mobile