- Social engineering concept
- Attack techniques
- Examples of social engineering attacks
- Social engineering tests
- Protection methods
- Various social engineering applications
Who Can Participate
All computer users, primarily system administrators
Since the training will be carried out practically, there should be as many computers as the number of participants in the training class.
Accumulation to be Obtained at the End of Education
Trainees will be immune to social engineering attacks, which are very common today and have the potential to damage all valuable information assets, particularly the prestige of the institution.
Duration: 2 days