Need to Know: Social Engineering
Some hackers don’t need computers at all. Join Anthony and Erica in exploring the dirty business of social engineering — when all it takes is a lie to crack open a company.
ArabicChinese (Simplified)CzechDutchEnglishFrenchFrench (Canadian)GermanHebrewHungarianIndonesianItalianJapaneseKoreanMalayPolishPortugueseRomanianRussianSpanishSpanish (Latin)Traditional ChineseTurkishVietnamese
Duration: 4:05 Minutes
Don't Be a Target: Your Trust
Social engineering requires contact and trust, and frequently occurs over the phone or through text messages.
Social Engineering Brief (No Background Music)
This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests.
Social Engineering for Managers
This module will explain the various social engineering methods hackers use, and teach managers how to work with staff to prevent data breaches and leaks.