Social Engineering Threats and Prevention

Cybersecurity    |    Beginner
  • 27 videos | 1h 2m 24s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 691 users Rating 4.6 of 691 users (691)
Social engineering is a form of attack that is accomplished using malicious activities through human interactions. In a common social engineering attack, humans are tricked into making security mistakes or giving away sensitive information. In this course, you'll explore the goals of social engineering including gaining access to sensitive data, physical locations, and systems. Discover vulnerabilities that make social engineering possible, explore common targets, and learn about indirect and direct social engineering attacks. Explore how searching a person or business's trash can produce information that can be used to carry out an attack, and discover the importance of staying up to date with the latest social engineering stats and trends. Explore the importance of cyber awareness and reporting workplace abnormalities, and discover the various social media site types including social networks, video sharing, blogging, and photo sharing. Lastly, explore factors that drive people to post compromising material on social media. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Discuss how social engineering is accomplished using malicious activities through human interactions
    List goals of social engineering including gaining access to sensitive data, physical locations, and systems
    Describe vulnerabilities that make social engineering possible
    List common targets for social engineering attacks including it staff and help desk staff
    Discuss how social engineering attacks are often the first step in gaining access
    Provide an overview of indirect social engineering attacks
    Provide an overview of direct social engineering attacks
    Discuss how 'pre-texting' techniques are used in on the phone attacks
    Recognize how attacks are carried out using email
    Provide an overview of reverse social engineering attacks
    Discuss how exploring a person or business's trash can produce information that can be used to carry out an attack
    Provide an overview of human behavior attacks and how social engineers exploit normal behavior
    Discuss phishing scams and describe how they work
  • Recognize the importance of staying up to date with the latest social engineering stats and trends
    Describe how information harvesting is used to gain information about individuals
    List steps used to prevent social engineering attacks
    Discuss the importance of organizations identifying and reporting abnormalities in the workplace
    List cyber awareness initiatives including training, policies, and procedures
    Recognize how social media sites can be used to gain information that can be used in an attack
    Differentiate between social media site types including social networks, video sharing, blogging, and photo sharing
    Recognize how everything is vulnerable to social media exploitation
    List items at stake during social engineering attacks including smartphones, databases, and sensitive documents
    Discuss the mindset or mentality of a common attacker
    Gather information about an individual via a social network
    Discuss factors that drive people to post compromising material on social media
    Protect accounts from social engineering attacks by managing profiles

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 30 users Rating 4.8 of 30 users (30)
Rating 4.7 of 100 users Rating 4.7 of 100 users (100)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 56 users Rating 4.4 of 56 users (56)
Rating 4.5 of 441 users Rating 4.5 of 441 users (441)
Rating 4.6 of 261 users Rating 4.6 of 261 users (261)