How attackers use social engineering to bypass your defenses


How attackers use social engineering to bypass your defenses

Source #1 – This is a SANS session presented in five segments. This is older material, but is considered bedrock information in social engineering curricular.  

Part 1:

Part 2:

Part 3:

Part 4:

Part 5:

Source #2  2>1: Teaming Up for Social Engineering Adventures  –  This segment is a webcast and presents the current work of social engineering guru Jen Fox.


If you were developing ethical training for a small business (50 employees), list 4 lessons you learned in the material above (each one must be from a different video segment – I have listed a total of 6 segments) that you feel would be imperative to include in enabling your employees to defend your company from social engineering attacks. Your employees all understand why social engineering is a security issue for the company. But a couple of them take you aside and ask why you are including social engineering in the company’s ethical training.  Explain how the 4 lessons you learned are relevant to your company’s ethical training.

Do you need high quality Custom Essay Writing Services?

Order now