Social Engineering Threats and Prevention
Cybersecurity
| Beginner
- 27 videos | 1h 2m 24s
- Includes Assessment
- Earns a Badge
Social engineering is a form of attack that is accomplished using malicious activities through human interactions. In a common social engineering attack, humans are tricked into making security mistakes or giving away sensitive information. In this course, you'll explore the goals of social engineering including gaining access to sensitive data, physical locations, and systems. Discover vulnerabilities that make social engineering possible, explore common targets, and learn about indirect and direct social engineering attacks. Explore how searching a person or business's trash can produce information that can be used to carry out an attack, and discover the importance of staying up to date with the latest social engineering stats and trends. Explore the importance of cyber awareness and reporting workplace abnormalities, and discover the various social media site types including social networks, video sharing, blogging, and photo sharing. Lastly, explore factors that drive people to post compromising material on social media. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDiscuss how social engineering is accomplished using malicious activities through human interactionsList goals of social engineering including gaining access to sensitive data, physical locations, and systemsDescribe vulnerabilities that make social engineering possibleList common targets for social engineering attacks including it staff and help desk staffDiscuss how social engineering attacks are often the first step in gaining accessProvide an overview of indirect social engineering attacksProvide an overview of direct social engineering attacksDiscuss how 'pre-texting' techniques are used in on the phone attacksRecognize how attacks are carried out using emailProvide an overview of reverse social engineering attacksDiscuss how exploring a person or business's trash can produce information that can be used to carry out an attackProvide an overview of human behavior attacks and how social engineers exploit normal behaviorDiscuss phishing scams and describe how they work
-
Recognize the importance of staying up to date with the latest social engineering stats and trendsDescribe how information harvesting is used to gain information about individualsList steps used to prevent social engineering attacksDiscuss the importance of organizations identifying and reporting abnormalities in the workplaceList cyber awareness initiatives including training, policies, and proceduresRecognize how social media sites can be used to gain information that can be used in an attackDifferentiate between social media site types including social networks, video sharing, blogging, and photo sharingRecognize how everything is vulnerable to social media exploitationList items at stake during social engineering attacks including smartphones, databases, and sensitive documentsDiscuss the mindset or mentality of a common attackerGather information about an individual via a social networkDiscuss factors that drive people to post compromising material on social mediaProtect accounts from social engineering attacks by managing profiles
IN THIS COURSE
-
46s
-
47s
-
35s
-
2m 32s
-
4m 55s
-
40s
-
4m 9s
-
3m 42s
-
3m 4s
-
45s
-
4m 29s
-
2m 2s
-
1m 22s
-
3m 21s
-
1m 29s
-
2m 2s
-
2m 59s
-
1m 12s
-
2m 43s
-
2m 29s
-
4m 3s
-
2m 8s
-
1m 29s
-
2m 9s
-
1m 44s
-
1m 20s
-
3m 29s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.