Mitigating Security Risks: Managing Social Engineering Risks
IT Security
| Intermediate
- 10 videos | 1h 12m 30s
- Includes Assessment
- Earns a Badge
Social engineering is a security attack method that takes advantage of the social aspect of human nature, which includes trust and interactivity. All members of an organization need to recognize how these subtle and manipulative techniques work and what they can do to avoid falling prey to them. In this course, you'll explore what's meant by social engineering, examining standard social engineering techniques, the basic principles of these kinds of attacks, their intended outcomes, who and what they target, and the risks they pose for your organization. Moving along, you'll investigate how social engineering is used to launch a cyberattack, study different types of spoofing attacks, and specify best practices to safeguard against social engineering. At the end of the course, you'll recognize the objectives of social engineering attacks, how they're carried out, and how to implement security measures to prevent them.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe what is meant by social engineering and give examplesDescribe the key intent of social engineeringList the principles of social engineering attacks (authority, intimidation, consensus, scarcity, urgency, familiarity, and trust)Describe using examples how social engineering is used as a medium to launch cyber attacks
-
List some types of social engineering attacksList some types of spoofing attacksIdentify the possible targets in social engineeringDescribe the best practices for protecting against social engineeringSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 37sIn this video, you’ll learn more about your instructor and the course. In this course, you will learn about social engineering, its risks, and the methods to avoid social engineering. You will learn about different types of spoofing attacks. The course will also cover the possible targets in social engineering. Later in the course, you will also learn about the best practices to safeguard against social engineering attacks. FREE ACCESS
-
11m 4sIn this video, you’ll learn more about social engineering. Social engineering is a method of manipulating human nature using conversations or interactions. You’ll learn that manipulation plays a critical role in social engineering. You’ll look at examples of manipulation and see how it is used in social engineering. You’ll discover there are different methods attackers might use. They may use different tricks to gain unauthorized access to a system or network. FREE ACCESS
-
4m 42sIn this video, you’ll learn social engineering could just be the stepping stone in an attack where the attackers want to get information. You’ll learn that in these situations, social engineering takes place in the reconnaissance phase. Attackers may use dumpster diving, shoulder surfing, or other methods. You’ll find that when attackers get a bit of information, they can work towards other goals. This could be data theft, data deletion, or financial gain. FREE ACCESS
-
8m 11sIn this video, you’ll learn about the principles of social engineering. You’ll learn these principles are the methods an attacker uses to gain access to sensitive or confidential information. These methods include showing authority, scarcity and urgency, social proof, and fear. You’ll look at examples and learn more about each of these. FREE ACCESS
-
8mIn this video, you’ll learn about the social engineering attack methodology. You’ll learn that just like any other attack method, social engineering attacks also have a specific methodology. These start with preparing for the attack. Next, the attackers move into the second phase, which is deception. That’s where the attackers engage with the target. Finally, you’ll learn that the third step is the foothold. This is where they execute the attack. FREE ACCESS
-
9m 18sIn this video, you’ll learn about the attack types used in social engineering. You’ll learn about phishing, which is a type of attack using an email that seems to be from a legitimate source. Once the recipient clicks on the link, they’ll be taken to a lookalike site and asked for their username and password. You’ll also learn about spoofed caller ID attacks and tailgating attacks. FREE ACCESS
-
7m 29sIn this video, you’ll learn about spoofing attacks. You’ll learn there are different types of spoofing attacks. Spoofing is simply pretending to be someone or something else. You’ll discover spoofing is also known as masquerading. You’ll look at specific examples of this sorts of attacks. FREE ACCESS
-
8m 46sIn this video, you’ll learn about possible targets of social engineering attacks. Attackers often target receptionists, IT helpdesks, IT administrators, and human resources teams. Often, receptionists are the key targets because they have all the numbers of the employees within an organization and the ability to connect to every employee. The IT helpdesk and the IT administrators are often targeted because they have access much of the IT infrastructure. FREE ACCESS
-
12mIn this video, you’ll learn about best practices for handling social engineering. You’ll learn that social engineering attacks can be conducted on individuals as well as organizations. This means you’ll need to follow best practices to avoid falling victim to social engineering attacks. You’ll learn to avoid putting personal information on the internet. You’ll also learn why it’s important to use different passwords across multiple websites. Finally, you’ll learn more about multi-factor authentication. FREE ACCESS
-
1m 22sIn this video, you’ll summarize what you’ve learned in this course. You’ve learned the basic concepts of social engineering. You also learned the principles of social engineering and social engineering as an attack tool. You learned about the types of social engineering attacks and about the types of spoofing attacks. You discovered possible targets of social engineering and the best practices in handling social engineering. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.