Recognising Social Engineering & Phishing Attacks

Learn to identify, question, and respond safely to phishing, impersonation, and manipulation-based cyber threats in everyday work,…

Learn to identify, question, and respond safely to phishing, impersonation, and manipulation-based cyber threats in everyday work, strengthening human-layer cybersecurity. Download Course PDF

What Will You Learn?

  • Foundations of social engineering and why humans are targeted
  • Email, spear-phishing, SMS, and messaging-based attacks
  • Identifying red flags, suspicious cues, and unusual requests
  • Impersonation, pretexting, and trust-exploitation tactics
  • Safe verification and response practices
  • Protecting credentials, passwords, and sensitive information
  • Reporting suspicious activity and contributing to a prevention culture
  • Creating a personal social-engineering defense action plan
No Data Available in this Section
No Data Available in this Section