Mitigating Security Risks: Managing Social Engineering Risks

IT Security    |    Intermediate
  • 10 videos | 1h 12m 30s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 33 users Rating 4.3 of 33 users (33)
Social engineering is a security attack method that takes advantage of the social aspect of human nature, which includes trust and interactivity. All members of an organization need to recognize how these subtle and manipulative techniques work and what they can do to avoid falling prey to them. In this course, you'll explore what's meant by social engineering, examining standard social engineering techniques, the basic principles of these kinds of attacks, their intended outcomes, who and what they target, and the risks they pose for your organization. Moving along, you'll investigate how social engineering is used to launch a cyberattack, study different types of spoofing attacks, and specify best practices to safeguard against social engineering. At the end of the course, you'll recognize the objectives of social engineering attacks, how they're carried out, and how to implement security measures to prevent them.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe what is meant by social engineering and give examples
    Describe the key intent of social engineering
    List the principles of social engineering attacks (authority, intimidation, consensus, scarcity, urgency, familiarity, and trust)
    Describe using examples how social engineering is used as a medium to launch cyber attacks
  • List some types of social engineering attacks
    List some types of spoofing attacks
    Identify the possible targets in social engineering
    Describe the best practices for protecting against social engineering
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 37s
    In this video, you’ll learn more about your instructor and the course. In this course, you will learn about social engineering, its risks, and the methods to avoid social engineering. You will learn about different types of spoofing attacks. The course will also cover the possible targets in social engineering. Later in the course, you will also learn about the best practices to safeguard against social engineering attacks. FREE ACCESS
  • 11m 4s
    In this video, you’ll learn more about social engineering. Social engineering is a method of manipulating human nature using conversations or interactions. You’ll learn that manipulation plays a critical role in social engineering. You’ll look at examples of manipulation and see how it is used in social engineering. You’ll discover there are different methods attackers might use. They may use different tricks to gain unauthorized access to a system or network. FREE ACCESS
  • Locked
    3.  The Intents of Social Engineering
    4m 42s
    In this video, you’ll learn social engineering could just be the stepping stone in an attack where the attackers want to get information. You’ll learn that in these situations, social engineering takes place in the reconnaissance phase. Attackers may use dumpster diving, shoulder surfing, or other methods. You’ll find that when attackers get a bit of information, they can work towards other goals. This could be data theft, data deletion, or financial gain. FREE ACCESS
  • Locked
    4.  Principles of Social Engineering
    8m 11s
    In this video, you’ll learn about the principles of social engineering. You’ll learn these principles are the methods an attacker uses to gain access to sensitive or confidential information. These methods include showing authority, scarcity and urgency, social proof, and fear. You’ll look at examples and learn more about each of these. FREE ACCESS
  • Locked
    5.  Social Engineering as the Attack Tool
    8m
    In this video, you’ll learn about the social engineering attack methodology. You’ll learn that just like any other attack method, social engineering attacks also have a specific methodology. These start with preparing for the attack. Next, the attackers move into the second phase, which is deception. That’s where the attackers engage with the target. Finally, you’ll learn that the third step is the foothold. This is where they execute the attack. FREE ACCESS
  • Locked
    6.  Types of Social Engineering Attacks
    9m 18s
    In this video, you’ll learn about the attack types used in social engineering. You’ll learn about phishing, which is a type of attack using an email that seems to be from a legitimate source. Once the recipient clicks on the link, they’ll be taken to a lookalike site and asked for their username and password. You’ll also learn about spoofed caller ID attacks and tailgating attacks. FREE ACCESS
  • Locked
    7.  Types of Spoofing Attacks
    7m 29s
    In this video, you’ll learn about spoofing attacks. You’ll learn there are different types of spoofing attacks. Spoofing is simply pretending to be someone or something else. You’ll discover spoofing is also known as masquerading. You’ll look at specific examples of this sorts of attacks. FREE ACCESS
  • Locked
    8.  Possible Targets in Social Engineering
    8m 46s
    In this video, you’ll learn about possible targets of social engineering attacks. Attackers often target receptionists, IT helpdesks, IT administrators, and human resources teams. Often, receptionists are the key targets because they have all the numbers of the employees within an organization and the ability to connect to every employee. The IT helpdesk and the IT administrators are often targeted because they have access much of the IT infrastructure. FREE ACCESS
  • Locked
    9.  Best Practices for Handling Social Engineering
    12m
    In this video, you’ll learn about best practices for handling social engineering. You’ll learn that social engineering attacks can be conducted on individuals as well as organizations. This means you’ll need to follow best practices to avoid falling victim to social engineering attacks. You’ll learn to avoid putting personal information on the internet. You’ll also learn why it’s important to use different passwords across multiple websites. Finally, you’ll learn more about multi-factor authentication. FREE ACCESS
  • Locked
    10.  Course Summary
    1m 22s
    In this video, you’ll summarize what you’ve learned in this course. You’ve learned the basic concepts of social engineering. You also learned the principles of social engineering and social engineering as an attack tool. You learned about the types of social engineering attacks and about the types of spoofing attacks. You discovered possible targets of social engineering and the best practices in handling social engineering. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.6 of 383 users Rating 4.6 of 383 users (383)
Rating 4.5 of 193 users Rating 4.5 of 193 users (193)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 64 users Rating 4.4 of 64 users (64)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.7 of 114 users Rating 4.7 of 114 users (114)