Understanding Social Engineering

Train employees on identifying social engineering and mitigating the risks

Key Learning Points:

  • What is social engineering
  • How to look out for potential attacks
  • How to defend yourself and others against social engineering deceptions
  • What are some of the ways to promote vigilance and defeat scams
  • How to mitigate personal and professional vulnerabilities with security awareness
  • What are some of the gaps and weakness and how to evaluate security assessments
Understanding Social Engineering
Understanding Social Engineering
Understanding Social Engineering
Understanding Social Engineering
Understanding Social Engineering
Understanding Social Engineering
CPD Points

Course Overview

Our Social Engineering course details all types of social engineering attacks, from baiting, phishing, spear phishing, pretexting and scare ware, giving the user important information about the ways in which each of these methods works.

This course is set in our Take 5 microlearning format and contains a single module. Learners will look at the different ways hackers and criminals can use social engineering to access confidential information. The course is designed to raise awareness and enable learners to be aware of the risks and the steps to take to stay alert and reduce the risk of falling victim to social engineering.

The online training also comprehensively details ways in which you can avoid falling victim to social engineering.

Course Details

  • Course duration: 5 minutes
  • Online microlearning course
  • Certificate on completion
  • Course can be tailored using Adapt Authoring Tool
Download PDF

Who Should Take This Course?

This general awareness course on Understanding Social Engineering is suitable for employees at all levels.

  • Full-time employees
  • Part-time employees
  • Administrators
  • Coordinators
  • Managers
  • Supervisors
  • Directors

The Assessment

This microlearning course on social engineering concludes with a quiz to check the learner's understanding of social engineering and how they protect against social engineering by being aware of the risks and suspicious of any unexpected communications they receive. To successfully complete the course, learners must aim to answer all questions correctly. Learners can also take the assessment again to improve their score.

2 Ways of Purchasing

You can purchase our courses individually or for even better value you can purchase the complete range of Compliance, Health and Safety or Performance Management courses in one neat bundle.

1. Individual Licenses

If you buy courses on an individual bases you pay a price per learner, per course per year. You can run these courses on your own LMS if Xapi/SCORM compliant or you can take them.

See Prices
Recommended

2. Complete Bundle

Buy all of the Compliance, Health and Safety or Performance Management courses in one great value package and receive unlimited benefits.

See Prices

1. Individual Pricing

Number of Learners Cost (per year)
1 - 10 29 / per learner
11 - 20 25 / per learner
21 - 50 20 / per learner
51 - 100 15 / per learner
101 - 150 10 / per learner
150+ POA

Exchange rates are updated regularly but are only intended as a guide.

2. Complete Bundle Pricing

If you buy all the Compliance, Health & Safety or Performance Management in a complete bundle, all features come as standard, no matter the size of your organisation!

Number of Learners Cost (per year)
1 - 100 30 / per learner
101 - 200 25 / per learner
201 - 300 21 / per learner
301 - 400 18 / per learner
401 - 500 15 / per learner
501 - 750 12.50 / per learner
751 - 1000 10 / per learner
1001 - 2500 8 / per learner
2501 - 5000 6 / per learner
5000 - 10,000 5 / per learner
10,000 + POA
Included Features
  • All courses in our catalogue
  • New courses added regularly
  • Branded, downloadable posters
  • Customise Course Content for Your Team
  • Astute eLearning Platform
  • Regular course updates
  • Dedicated Account Manager
  • Unlimited help desk support

Exchange rates are updated regularly but are only intended as a guide. Prices are based on a 2 year contract.

Get a Quote

Why You Need Social Engineering Training

Social engineering describes the psychologically manipulative ways hackers and criminals access confidential information, like passwords and bank information. Methods included in this manipulation include pretexting, spear phishing, and clone phishing, amongst a whole host of others (for more information, see phishing awareness training).

Recognising and combating social engineering in the workplace is paramount to your business' cyber security and information security.

Why You Need Social Engineering Training

FAQ's

If you have any questions that are not covered here, please get in touch.

Get in Touch
What is an example of social engineering?
Social engineering is a technique used by cybercriminals to gain personal data from individuals through unauthorised access. This can occur by either direct contact and tricking victims into handing over their details, or by clicking on suspicious links and attachments that install malware on the device. Some examples of social engineering include baiting, phishing, pretexting, scareware and ransomware.
How to protect against social engineering?
While software can help protect organisations against most forms of cyberattacks, strong levels of human competency through training is also important. Cyber security training enables a level of awareness within the organisation so that employees can confidently identify and prevent social engineering attacks. Social engineering relies on human interaction, so making employees aware of the dangers of these attacks can help develop a vigilant workforce.
What is social engineering?
Social engineering is a type of cyber-attack designed to manipulate people into giving up confidential, personal information. The types of information targeted often varies, cybercriminals look to trick people into giving up passwords, entering bank details or downloading malicious software. Social engineering tactics aim to exploit an individual’s natural inclination to trust as opposed to hacking into systems.

7 Day Instant FREE Trial

Try a Demo