Learn to identify, question, and respond safely to phishing, impersonation, and manipulation-based cyber threats in everyday work, strengthening human-layer cybersecurity. Download Course PDF
What Will You Learn?
- Foundations of social engineering and why humans are targeted
- Email, spear-phishing, SMS, and messaging-based attacks
- Identifying red flags, suspicious cues, and unusual requests
- Impersonation, pretexting, and trust-exploitation tactics
- Safe verification and response practices
- Protecting credentials, passwords, and sensitive information
- Reporting suspicious activity and contributing to a prevention culture
- Creating a personal social-engineering defense action plan
No Data Available in this Section