0 Item(s)
Defeating Social Engineers (Standard)
Keyword(s)
networks, computer systems, hackers, sensitive information, best practices, social engineering
Credit
Credit Hours:0.25
Description
With increasingly sophisticated technical defenses for networks and computer systems, hackers often decide that it’s much easier to simply go around these perimeter defenses by attacking the end user. This standard, 11-minute course will teach end users how to identify and avoid giving away sensitive information to these hackers. This HTML5-based, iPad-compatible course uses high-quality video and real-world simulations to teach the best practices for avoiding social engineering attacks.