Introduction to Social Engineering

Audio • 12 minutes

Learning Objectives

  1. Discover what social engineering is and how it’s used in cybersecurity
  2. Acknowledge famous examples of social engineering hacks
  3. Identify techniques to avoid falling prey to a social engineer

Lesson Description

This lesson will explore cybersecurity, specifically social engineering techniques and how to protect yourself from falling prey to them. Hackers often pursue individuals as they’re considered the weakest link to the security chain. This lesson covers various attack methods, such as whale phishing, tailgating, and baiting. It outlines several ways that you can use to reduce the chances of falling victim to a cyberattack.