Course

IQ Social Engineering

Social engineering does not rely on a computer’s weakness but instead relies on human kindness. In this course, you will learn the most common ways social engineers manipulate you into giving them information, and what you can do to stop them.
39 minutes 3 videos

Course description

Next, Revealing someone's personal data, even accidentally, may violate numerous laws and result in large fines. Keeping data secure from those who should not have access to it is critical. You will learn how to properly identify, handle and protect sensitive data.

Syllabus

Russian Cybersecurity Threats

Video - 00:03:00

Cyberattacks are now part of modern conflict. Get the facts about potential Russian cyberwarfare and what you can expect to see (and not see) with expert Keatron Evans.
Level Up Your Cybersecurity

Video - 00:04:00

Game on! Explore the latest cybersecurity threats and what you can do to protect yourself and others against them ... and stop hackers from winning!
Need to Know: Incident Response

Video - 00:03:00

Ransomware hits the company! Now Neena has one of the hardest jobs of all: keeping everyone calm.
Just the Facts: Clean Desk Policy

Video - 00:04:00

In cybersecurity, a “clean” desk doesn’t mean a tidy desk. Get the facts on clean desk policies and how they can be used to protect your customers, your data and your organization.
Need to Know: Social Media Best Practices

Video - 00:03:00

Friend or foe? Erica and Ivana take a closer look at a suspicious request and figure out just who they can trust.
Just the Facts: Data Privacy

Video - 00:05:00

Get the facts on data privacy. Find out what data privacy is, how it works ... and what happens when it goes wrong!
Need to Know: Insider Threats

Video - 00:03:00

Something lurks in the shadows of the office, and Harold and his friends are about to meet it. How can you defeat yourself?
Work Bytes: Social Engineering

Video - 00:04:00

It’s a fairy godmother’s job to help everyone. But when it comes to hackers, helping them is exactly the wrong move! See how the office’s fairy godmother handles a social engineering threat.
Just the Facts: Social Engineering

Video - 00:05:00

Some cyber-defenses can be broken without the use of a computer. Explore the details and dangers of social engineering, the tactics that exploit the human element, and get yourself informed with Just the Facts.
Data Security Basics

Assessment - 5 questions

Social Engineering Assessment

Assessment - 5 questions

Meet the author

Keatron Evans is a cybersecurity and workforce development expert with over 17 years of experience in penetration testing, incident response and information security management for federal agencies and Fortune 500 organizations. He is VP of Portfolio and Product Strategy at Infosec, where he empowers the human side of cybersecurity with cyber knowledge and skills to outsmart cybercrime. Keatron is an established researcher, instructor and speaker — and lead author of the best-selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish. He regularly speaks at major industry events like RSA and serves as a cybersecurity subject matter expert for major media outlets like CNN, Fox News, Information Security Magazine and more.

Keatron holds a Bachelor of Science in Business Information Systems and dozens of cybersecurity certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Cloud Security Professional (CCSP) and Licensed Penetration Tester (LTP). When not teaching, speaking or managing his incident response business, KM Cyber Security LLC, Keatron enjoys practicing various martial arts styles, playing piano and bass guitar, and spending time with his family.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training you can trust