FREE

Weʼre Giving Away an ISO 50001 Handbook, Quality in Project Management and Quality Costing Video
WWISE


    Cyber Security: Social engineering

    Certificate Approved by WWISE
    Course Duration
    482:06 Minutes
    12 months access

    Course Summary

    In this course, you gain the skills to defend against social engineering attacks that threaten organizational security. You learn the technical and psychological methods of manipulation, impersonation and persuasion used by social engineers. Further, this course incorporates hands-on activities designed to understand the motivations and methods used by social engineers, to better protect your organization and prevent data breaches.

    Who Should Attend?

    Software developers, information security professionals, incident responders, computer security researchers, corporate investigators.

    Course Objectives

    Social Engineering (SE) awareness is to provide company employees the tools to recognize attack attempts by malicious social engineers, who could intend to extort private corporate information employing psychological manipulation techniques.

    Course Modules

    1. Need to Know: Social Engineering  
    2. Social Engineering 
    3. Social Engineering Brief 
    4. Insider Threats 
    5. Identity Theft 
    6. Social Media 
    7. Social Media for Financial Institutions 
    8. Help Desk 
    9. Advanced Persistent Threat (APT) 
    10. WORKed Episode 5: Mallomars 
    11. Need to Know: Introduction 
    12. Introduction 
    13. Need to Know: Conclusion 
    14. Conclusion 
    15. Social Engineering for Managers 
    16. Social Engineering for Educators 
    17. Social Engineering for Healthcare Professionals And Providers 
    18. Social Engineering for Healthcare Managers 
    19. Social Engineering for Healthcare Executives 
    20. Social Engineering for Financial Institutions 
    21. Breach Notification for Healthcare Managers 
    22. Avoiding Cybersecurity Risks for Executives 
    23. Privacy for Managers 
    24. Privacy for Executives 
    25. Privacy for HR 
    26. Election Security 
    27. HIPAA HITECH 
    28. Consequences of PHI Release 
    29. HIPAA/HITECH for Healthcare Managers 
    30. HIPAA/HITECH for Healthcare Executives 
    31. The Family Educational Rights and Privacy Act (FERPA) 
    32. FERPA for K-12 
    33. FERPA for Post-Secondary Education 
    34. Introduction to CCPA 
    35. PCI DSS 
    36. PCI DSS Brief 
    37. Privacy and PII 
    38. Privacy and PII Brief 
    39. Privacy and PII Brief (India Localization) 
    40. Privacy and EU GDPR 
    41. Gramm-Leach-Bliley Act (GLBA) 
    42. Sarbanes-Oxley Act (SOX) 
    43. Electronic Funds Transfer Act (EFTA) 
    44. Handling SSA Provided Information 
    45. Red Flags Rule 
    46. FCPA 
    47. Personal Information Protection and Electronic Documents Act (PIPEDA) 
    48. Protecting Federal Tax Information 
    49. Anti-Money Laundering 
    50. CJIS: Handling CJI 
    51. CJIS Security Policy 
    52. GDPR for Executives 
    53. GDPR for Managers 
    54. GDPR for Data Processors 
    55. Who Can You Trust? (Social Engineering) 
    56. Double Check (Verifying Wire Transfers) 
    57. Knowledge Is Power (Security Training) 
    58. Every Step You Take (Mentoring) 
    59. Check Yourself (BEC) 
    60. H@ckj0b Season 1 Episode 1 “Recon” 

    Benefits

    • Reduced Risk Through Awareness Training
    • A More Comprehensive Cybersecurity Approach
    • Prevents Costly Spending

    Certification

    We’ve made it simple to access your interactive assessments directly in your online learning journey, by embedding them as part of the module.

    Assessment