Introduction to Social Engineering
Audio • 12 minutes
Learning Objectives
- Discover what social engineering is and how it’s used in cybersecurity
- Acknowledge famous examples of social engineering hacks
- Identify techniques to avoid falling prey to a social engineer
Lesson Description
This lesson will explore cybersecurity, specifically social engineering techniques and how to protect yourself from falling prey to them. Hackers often pursue individuals as they’re considered the weakest link to the security chain. This lesson covers various attack methods, such as whale phishing, tailgating, and baiting. It outlines several ways that you can use to reduce the chances of falling victim to a cyberattack.