Need to Know: Introduction
Poster - Need to Know: Social Engineering
Don't Be a Target: Your Trust
Social engineering requires contact and trust, and frequently occurs over the phone or through text messages.
Social Engineering for Managers
This module will explain the various social engineering methods hackers use, and teach managers how to work with staff to prevent data breaches and leaks.
Infosec Named a Leader in 2019 Gartner Magic Quadrant
Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.