Course Summary
In this course, you gain the skills to defend against social engineering attacks that threaten organizational security. You learn the technical and psychological methods of manipulation, impersonation and persuasion used by social engineers. Further, this course incorporates hands-on activities designed to understand the motivations and methods used by social engineers, to better protect your organization and prevent data breaches.
Who Should Attend?
Software developers, information security professionals, incident responders, computer security researchers, corporate investigators.
Course Objectives
Social Engineering (SE) awareness is to provide company employees the tools to recognize attack attempts by malicious social engineers, who could intend to extort private corporate information employing psychological manipulation techniques.
Course Modules
- Need to Know: Social Engineering
- Social Engineering
- Social Engineering Brief
- Insider Threats
- Identity Theft
- Social Media
- Social Media for Financial Institutions
- Help Desk
- Advanced Persistent Threat (APT)
- WORKed Episode 5: Mallomars
- Need to Know: Introduction
- Introduction
- Need to Know: Conclusion
- Conclusion
- Social Engineering for Managers
- Social Engineering for Educators
- Social Engineering for Healthcare Professionals And Providers
- Social Engineering for Healthcare Managers
- Social Engineering for Healthcare Executives
- Social Engineering for Financial Institutions
- Breach Notification for Healthcare Managers
- Avoiding Cybersecurity Risks for Executives
- Privacy for Managers
- Privacy for Executives
- Privacy for HR
- Election Security
- HIPAA HITECH
- Consequences of PHI Release
- HIPAA/HITECH for Healthcare Managers
- HIPAA/HITECH for Healthcare Executives
- The Family Educational Rights and Privacy Act (FERPA)
- FERPA for K-12
- FERPA for Post-Secondary Education
- Introduction to CCPA
- PCI DSS
- PCI DSS Brief
- Privacy and PII
- Privacy and PII Brief
- Privacy and PII Brief (India Localization)
- Privacy and EU GDPR
- Gramm-Leach-Bliley Act (GLBA)
- Sarbanes-Oxley Act (SOX)
- Electronic Funds Transfer Act (EFTA)
- Handling SSA Provided Information
- Red Flags Rule
- FCPA
- Personal Information Protection and Electronic Documents Act (PIPEDA)
- Protecting Federal Tax Information
- Anti-Money Laundering
- CJIS: Handling CJI
- CJIS Security Policy
- GDPR for Executives
- GDPR for Managers
- GDPR for Data Processors
- Who Can You Trust? (Social Engineering)
- Double Check (Verifying Wire Transfers)
- Knowledge Is Power (Security Training)
- Every Step You Take (Mentoring)
- Check Yourself (BEC)
- H@ckj0b Season 1 Episode 1 “Recon”
Benefits
- Reduced Risk Through Awareness Training
- A More Comprehensive Cybersecurity Approach
- Prevents Costly Spending
Certification
We’ve made it simple to access your interactive assessments directly in your online learning journey, by embedding them as part of the module.