What will you learn?
Using social engineering, a glorified manipulation strategy, cyber criminals are able to acquire sensitive or confidential information that allows for their success. | |
An attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures | |
Learn their tactics and what to watch out for to using this downloadable whitepaper from KnowBe4, our partners in Security Awareness Training. |