We use cookies to analyze our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information you have provided to them or that they have collected based on your use of their services. Read how we use cookies and how you can manage them by clicking on "Preferences".

Privacy Preferences

When you visit our website, the website may store or retrieve information via your browser, usually in the form of cookies. Since we respect your right to privacy, you can choose not to allow the collection of data from certain types of services. However, not allowing these services may affect your experience.


Recognize social engineering

More than 85% of all hacks started with social engineering. Social engineering attacks therefore pose a significant risk to the organization but also to yourself. Virtually all types of information can be used by social engineers. It is therefore sometimes difficult to notice them. But what exactly is Social Engineering? In this course you will learn what social engineering is and why it works.

People are not always who they claim to be. This applies to contact by e-mail and telephone as well as to face-to-face meetings. It is important to know who you are dealing with and to know what authorization and access to information the person you are talking to is. How do you know who you are dealing with and how can you avoid becoming a victim of social engineering? We learn how to determine the sender's intentions and how to handle the situation. Social engineering technology uses an important link in the security chain: people. Employees have access to important information that is attractive to others. That is why it is important to recognize methods of social engineering.