0 Item(s)
Defeating Social Engineers (Advanced)
Keyword(s)
technical defense, computer systems, hackers, firewall, network, confidential information, social engineering
Credit
Credit Hours:0.25
Description
With increasingly sophisticated technical defenses for networks and computer systems, hackers often decide that it’s much easier to simply go around these perimeter defenses by attacking the end user. After all, end users have what they want – a computer that’s behind the network firewall, a network username and password, and possibly access to trade secrets, confidential information, and bank accounts. This course will teach end users how to identify and avoid giving away sensitive information to these hackers. This HTML5-based, iPad-compatible course uses high-quality video and real-world simulations to teach the best practices for avoiding social engineering attacks.