Social Engineering Attack and Protection Methods

Share on facebook
Share on google
Share on twitter
Share on linkedin

Main Topics

  • Social engineering concept
  • Attack techniques
  • Examples of social engineering attacks
  • Social engineering tests
  • Protection methods
  • Various social engineering applications

Who Can Participate
All computer users, primarily system administrators

Prerequisites
Since the training will be carried out practically, there should be as many computers as the number of participants in the training class.

Accumulation to be Obtained at the End of Education
Trainees will be immune to social engineering attacks, which are very common today and have the potential to damage all valuable information assets, particularly the prestige of the institution.

Duration: 2 days