Table of Contents
What time shall I arrive at the venue?
Please arrive at the venue at 8:45am.
What are the prerequisites?
There are no formal prerequisites for this course.
Who should attend this course?
Anyone who wishes to enhance their knowledge of social engineering can attend this course. Professionals who wish to learn how to secure systems fr…
Do you offer support for the course?
We are able to provide support via phone & email prior to attending, during and after the course.
What is included in the course?
Delegate pack consisting of course notes and exercises, Manual, Experienced Instructor, and Refreshments
What is the duration of this course?
This course is 1 day.
How long until I receive the course confirmation details?
Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading…
What subjects involve social engineering?
Universities and colleges in the UK are offering courses in the following subject areas:EconomicsPoliticsSociologySocial policySocial workAnthropologyHuman and social geographyDevelopment studies
How good is social engineering?
What Does a Social Engineering Attack Look Like?Email from a friend. If a criminal manages to hack or socially engineer one person’s email password they have access to that person’s contact list–and because most people use one …Email from another trusted source. …Baiting scenarios. …Response to a question you never had. …Creating distrust. …
What are some examples of social engineering?
Which of the following are examples of social engineering attacks?Spear Phishing Emails, Calls or Texts. Phishing is a term used to describe cyber criminals who “fish” for information from unsuspecting users. …Baiting. …Quid Pro Quo. …Tailgating or Piggybacking.