Mitigating Security Risks: Managing Social Engineering Risks

IT Security
  • 10 Videos | 1h 16m 30s
  • Includes Assessment
  • Earns a Badge
Social engineering is a security attack method that takes advantage of the social aspect of human nature, which includes trust and interactivity. All members of an organization need to recognize how these subtle and manipulative techniques work and what they can do to avoid falling prey to them. In this course, you'll explore what's meant by social engineering, examining standard social engineering techniques, the basic principles of these kinds of attacks, their intended outcomes, who and what they target, and the risks they pose for your organization. Moving along, you'll investigate how social engineering is used to launch a cyberattack, study different types of spoofing attacks, and specify best practices to safeguard against social engineering. At the end of the course, you'll recognize the objectives of social engineering attacks, how they're carried out, and how to implement security measures to prevent them.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe what is meant by social engineering and give examples
    describe the key intent of social engineering
    list the principles of social engineering attacks (authority, intimidation, consensus, scarcity, urgency, familiarity, and trust)
    describe using examples how social engineering is used as a medium to launch cyber attacks
  • list some types of social engineering attacks
    list some types of spoofing attacks
    identify the possible targets in social engineering
    describe the best practices for protecting against social engineering
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 37s
    UP NEXT
  • Playable
    2. 
    Social Engineering Explained
    11m 4s
  • Locked
    3. 
    The Intents of Social Engineering
    4m 42s
  • Locked
    4. 
    Principles of Social Engineering
    8m 11s
  • Locked
    5. 
    Social Engineering as the Attack Tool
    8m
  • Locked
    6. 
    Types of Social Engineering Attacks
    9m 18s
  • Locked
    7. 
    Types of Spoofing Attacks
    7m 29s
  • Locked
    8. 
    Possible Targets in Social Engineering
    8m 46s
  • Locked
    9. 
    Best Practices for Handling Social Engineering
    12m
  • Locked
    10. 
    Course Summary
    1m 22s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.