Security awareness games by Infosec
On-demand training for every cybersecurity role
Certification training from industry experts
2021 IT & Security Talent Pipeline Study
Cyber Work Podcast
New cybersecurity career conversations every week
Join a team dedicated to making a difference.
This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests.
Social engineering occurs when a hacker uses two-way forms of communication, including phones and messaging, to trick users into sharing personal or confidential information. Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.
Links may lead somewhere exciting - or somewhere dangerous. Learn how to detect a suspicious link and avoid being hooked by a phisher!