What is Social Engineering?
-
Author: Michael Connory
-
Level: Beginners
-
Study time: 20 min
Course overview
Social engineering is the art of manipulation to steal information. Unlike cybercrimes that involve cracking complex algorithms, it relies on predictable human behavior to get victims to reveal information voluntarily. This course provides an overview of how social engineers exploit human psychology to access sensitive information, as well as tips for spotting attacks. By becoming aware of these dangers, you’re less likely to fall victim to various forms of manipulation.
-
Video time: 5 minutes
-
Exams: None
What's included?
-
4 Chapters
-
1 Certification
-
3 Questions
-
1 Video
Understand Social Engineering
Social engineering is one of the most common ways criminals disarm companies’ and individuals’ digital and physical defences. Broadly speaking, social engineering is the practice of manipulating people into revealing confidential information. That information is then used to gain access to computer systems, data, and even physical locations.
Personal brand
You will also learn how to recognise social engineering and put in place strategies and structures to help recognise and respond to these attacks.
Michael Connory
Lead Instructor
ABOUT Michael
Welcome to the world of Michael Connory, a true luminary in the realm of Cyber Security. As one of Australia's most esteemed and widely recognised experts in the field, Michael's journey began at a remarkably young age, hacking his first computer at just 12 years old. With an impressive career spanning over 30 years, he has honed his expertise while working with prominent organisations like Microsoft, Thales, Oracle, and Security in Depth. Not content with personal accomplishments, Michael's passion for knowledge sharing has led him to train and empower over 150,000 individuals worldwide through his transformative programs. Additionally, he has left an indelible mark as an author with two acclaimed books, namely "Mastering Cyber Assurance" and "The Definitive Guide to Managing Your IT Company." Embrace the invaluable insights and guidance of this visionary cyber virtuoso as you explore the captivating world of cybersecurity.