Skip main navigation

Defining Impersonation

In this video, you will be introduced to impersonation, explore the main objectives of this type of social engineering attack, and identify who is at risk.

Spyware in the Real World (Finfisher)

In the video, you will be introduced to FinFisher, a major spyware, that can hijack webcam and microphones. The information gained by spyware such as FinFisher is sold, typically to …

Spyware: Understanding Its Behavior and Operation

In the video, you will learn how spyware invades devices and gathers information about users (e.g. sites visited, passwords, payment info, emails), and sends the information back to the controller, …

Baiting Tactics and Examples

In this video, a very interesting real-life example is discussed, as a combination of attack types is employed by the attacker.

Defining Baiting

In this video, you will be introduced to baiting, explore the main objectives of this type of social engineering attack, and identify who is at risk.

Tailgating Tactics and Examples

In this video, two different tailgating tactics are discussed, highlighting the red flags to look out for to prevent such attacks.

Defining Tailgating

In this video, you will be introduced to tailgating. You will explore the main objectives of this type of social engineering attack and identify who is at risk.

Defining Dumpster Diving

In this video you will learn more about dumpster diving, to complement your learning from the previous course. We will explore the main objectives of this type of social engineering …

Trojans in the Real World (BEAST)

This video will reveal more about Ransomware, a type of malware that locks files, and then prompts users to pay in order to unlock them. Increasingly, this is the most …