Social Engineering Training: Deceptions and Defences

Level: Intermediate
Rating: 4.6/5 4.58/5 Based on 12 Reviews

In this Social Engineering course you gain the knowledge to defend against social engineering deceptions that threaten organizational security. You will gain the social engineering awareness to learn what is a social engineering attack. You will learn to prevent data breaches by learning the motivations and methods used by social engineers to access sensitive data and exploit organizational vulnerabilities. Gain the skills to implement procedures to defeat deceptions, and mitigate personnel vulnerabilities with this social engineering awareness course.

Key Features of this Social Engineering Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Defend against social engineering deceptions that threaten organizational security
  • Plan and evaluate security assessments for human weaknesses
  • Promote vigilance and implement procedures to defeat deceptions
  • Mitigate personnel vulnerabilities with security awareness
  • Measure your organization’s preparedness for attacks



Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals


Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching
View Details ›

Customize Your Team Training Experience


Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

Team Training

Important Social Engineering Course Information

  • Course Description

    In this social engineering prevention training course, you gain the skills to defend against social engineering attacks that threaten organizational security. You learn the technical and psychological methods of manipulation, impersonation and persuasion used by social engineers. Further, this course incorporates hands-on activities designed to understand the motivations and methods used by social engineers, to better protect your organization and prevent data breaches.

Social Engineering Course Outline

  • Introduction to Social Engineering

    Evaluating the organizational risks

    • Assessing social engineering threats
    • Analyzing classic case studies

    Thinking like a social engineer

    • Considering attack frameworks
    • Reviewing the methods of manipulation
    • Examining legal issues and social concerns
  • Gathering Information and Intelligence

    Identifying information sources

    • Gathering information passively and actively
    • Leveraging social media
    • Exploiting Google hacking

    Collecting target information

    • Ripping information from sites with theHarvester
    • Dumpster diving for secrets and intelligence
    • Profiling users for weaknesses

    Minimizing information leaks

    • Securing information leaks
    • Implementing secure disposal policies
    • Pinpointing reconnaissance probes
  • Identifying Communication Models

    Profiling an information architecture

    • Implementing the Berlo communication model
    • Source
    • Message
    • Channel
    • Receiver
    • Determining communication weaknesses

    Addressing communication flaws

    • Verifying the source
    • Securing the information channel
  • Assessing Elicitation Methods

    Drawing out information

    • Soliciting information
    • Interview techniques
    • Identifying elicitation tactics and goals

    Mitigating information leaks

    • Maintaining situational awareness
    • Implementing scripted responses
  • Gaining Physical Access

    Circumventing physical security

    • Identifying weak types of locks
    • Bypassing electronic access controls

    Securing the environment

    • Implementing high security locks
    • Preventing lock bumping
  • Impersonating Authorized Personnel

    Gaining access with a disguise

    • Identifying spoofing techniques
    • Discovering change blindness deception
    • Assessing Internet impersonation techniques

    Defending against impersonation and forgery

    • Implementing techniques to verify identity
    • Avoiding skimmers and hidden technology threats
  • Employing Psychology for Persuasion

    Examining human weaknesses

    • Leveraging Cialdini’s motivation factors
    • Identifying mindlessness dangers
    • Exploring commitment and consistency vulnerability

    Compelling behavior

    • Exploiting social proofing
    • Taking advantage of implied authority
    • Demanding action with "quid pro quo"

    Bolstering resistance to persuasion

    • Adhering to policy and rules
    • Recognizing risky situations
    • Learning to interpret and then recognize
  • Implementing Management Countermeasures

    Assessing social engineering vulnerabilities

    • Conducting a penetration test
    • Creating a scope of work
    • Mitigating legal issues and embarrassment

    Creating comprehensive policies

    • Establishing verification policies
    • Regulating the use of social networks
    • Delivering effective security awareness training

Social Engineering Training FAQs

  • What is social engineering?

    Social engineering is what it is called when hackers manipulate people to give up confidential information. There are many forms of social engineering.

  • What is a social engineering attack?

    It is an attack that relies heavily on human interaction and uses manipulation to have people break normal security procedures and practices.

  • Can I bring this social engineering awareness course to my facility to train my team?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available as Private Team Training.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat

Why do we require your location?

It allows us to direct your request to the appropriate Customer Care team.

100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Why do we require your location?

It allows us to direct your request to the appropriate Customer Care team.

Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français