In this article, you will learn what to do about fake error messages and scareware. These attacks use amygdala hijacking, which we have already spoken about when we reviewed social …
This article explores the concept of Man in the Middle attacks (MiTM). An MiTM attack is essentially when a hacker sits between you and where you are going on your …
Vishing is another social engineering technique. Vishing – voice phishing – is essentially phishing over the phone. These attacks can also be adapted by having the hacker appear in person, …
In the coming week, we will cover the following topics: Red Teams and Blue Teams how to track a hacker how to prepare for, and recover from, an attack By …
Social engineering is an act that influences a person to take action, and it is an important concept to understand when learning about how hackers will try to access your …
Over the next four weeks, you will learn why you could be a target for hackers, how hackers may try to breach your network, how you can protect your network …
We have incorporated quiz-based learning within this course. The benefit of quizzes are that they aid and support learning. They do not contribute towards your final score. They’re a fantastic …