Module 1: Introduction to Social Engineering
Module 2: Information Gathering and Reconnaissance
Module 3: Phishing Attacks
Module 4: Pretexting and Impersonation
Module 5: Baiting and Quid Pro Quo Attacks
Module 6: Physical Social Engineering
Module 7: Social Engineering and Cyber Fraud
Case Study: Social Engineering Attack on a Nigerian Financial Institution
You are unauthorized to view this page.