IQ Social Engineering Course

Social engineering does not rely on a computer’s weakness but instead relies on human kindness. In this course, you will learn the most common ways social engineers manipulate you into giving them information, and what you can do to stop them.

39 minutes

Course description

Next, Revealing someone's personal data, even accidentally, may violate numerous laws and result in large fines. Keeping data secure from those who should not have access to it is critical. You will learn how to properly identify, handle and protect sensitive data.


Russian Cybersecurity Threats

Video - 00:03:00

Cyberattacks are now part of modern conflict. Get the facts about potential Russian cyberwarfare and what you can expect to see (and not see) with expert Keatron Evans.
Level Up Your Cybersecurity

Video - 00:04:00

Game on! Explore the latest cybersecurity threats and what you can do to protect yourself and others against them ... and stop hackers from winning!
Need to Know: Incident Response

Video - 00:03:00

Ransomware hits the company! Now Neena has one of the hardest jobs of all: keeping everyone calm.
Just the Facts: Clean Desk Policy

Video - 00:04:00

In cybersecurity, a “clean” desk doesn’t mean a tidy desk. Get the facts on clean desk policies and how they can be used to protect your customers, your data and your organization.
Need to Know: Social Media Best Practices

Video - 00:03:00

Friend or foe? Erica and Ivana take a closer look at a suspicious request and figure out just who they can trust.
Just the Facts: Data Privacy

Video - 00:05:00

Get the facts on data privacy. Find out what data privacy is, how it works ... and what happens when it goes wrong!
Need to Know: Insider Threats

Video - 00:03:00

Something lurks in the shadows of the office, and Harold and his friends are about to meet it. How can you defeat yourself?
Work Bytes: Social Engineering

Video - 00:04:00

It’s a fairy godmother’s job to help everyone. But when it comes to hackers, helping them is exactly the wrong move! See how the office’s fairy godmother handles a social engineering threat.
Just the Facts: Social Engineering

Video - 00:05:00

Some cyber-defenses can be broken without the use of a computer. Explore the details and dangers of social engineering, the tactics that exploit the human element, and get yourself informed with Just the Facts.
Data Security Basics

Assessment - 5 questions

Social Engineering Assessment

Assessment - 5 questions

Meet the author

Keatron Evans

Keatron is a highly experienced cybersecurity expert and VP of Portfolio and Product Strategy at Infosec with a wealth of expertise. Keatron is a respected author, instructor and speaker who holds numerous cybersecurity certifications and regularly contributes as a subject matter expert for major media outlets.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust