1
/
of
1
FoodSafetyMarket
Social Engineering
Social Engineering
Regular price
$8.00 USD
Regular price
Sale price
$8.00 USD
Unit price
/
per
Shipping calculated at checkout.
Couldn't load pickup availability
“You must trust and believe in people, or life becomes impossible.” So said the famous Russian writer Anton Chekhov. And, well, he had a point. Without trust, we wouldn’t form friendships or relationships. But here’s the thing, Anton: you really can’t trust everyone.
It was probably a bit different back in the 19th century what with the lack of computers and everything. But cyber tricksters and con artists are everywhere today, and they’re preying on our natural inclination to trust and help others. By pretending to be genuine, social engineering criminals manipulate people into giving away confidential and sensitive information.
By the end of this course, you’ll be able to:
• Understand the dangers of social engineering and how it works
• Recognize the different types of social engineering attacks
• Avoid becoming a victim of social engineering
Why take this course?
The majority of cyberattacks are the result of social engineering. Yet, we can reduce the chances of falling victim by spotting the signs and remembering to think before opening that attachment. This short course is suitable for everyone, particularly organizations, professionals, and social media users. So, trust this course to help you protect yourself.
10 mins | SCORM | Workbook
It was probably a bit different back in the 19th century what with the lack of computers and everything. But cyber tricksters and con artists are everywhere today, and they’re preying on our natural inclination to trust and help others. By pretending to be genuine, social engineering criminals manipulate people into giving away confidential and sensitive information.
By the end of this course, you’ll be able to:
• Understand the dangers of social engineering and how it works
• Recognize the different types of social engineering attacks
• Avoid becoming a victim of social engineering
Why take this course?
The majority of cyberattacks are the result of social engineering. Yet, we can reduce the chances of falling victim by spotting the signs and remembering to think before opening that attachment. This short course is suitable for everyone, particularly organizations, professionals, and social media users. So, trust this course to help you protect yourself.
10 mins | SCORM | Workbook