From the course: Cybersecurity Fundamentals for IT Technicians by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Social engineering, impersonation techniques, and avoidance
From the course: Cybersecurity Fundamentals for IT Technicians by Pearson
Social engineering, impersonation techniques, and avoidance
In this lesson, we're going to talk about some pretty scary things. We're going to talk about social engineering, impersonation, and how do we avoid all of these things. So, let's get in. Tailgating. One of the most common ways of squirming your way into somebody's environment. Hey, I forgot my badge. Can you hold the door? Oh, sure. And then, poof, thank you so much. Oh, what a crazy day. I forgot my badge at home. Oh, no worries. All right. Well, have a good day. You too. Poof. And now that person's inside. Because just pretending that you have a badge and acting like you belong there oftentimes is believable enough for somebody to let you into that environment. Somebody could walk up, steal laptops, walk up, steal free coffee, whatever. They might run in and do some other nefarious things that might be even more dangerous. if you're a school or something to that effect. Keep that in mind. You're going to need to look for these things. The other thing is pretending to be another…
Contents
-
-
-
(Locked)
Module introduction1m 6s
-
(Locked)
Learning objectives3m 16s
-
(Locked)
Understanding common threats, investigation tools and processes7m 55s
-
(Locked)
Cybersecurity best practices8m 45s
-
(Locked)
Threats and vulnerabilities12m 40s
-
(Locked)
How to scan for and detect malware5m 40s
-
(Locked)
Password hygiene and best practices4m 43s
-
(Locked)
Social engineering, impersonation techniques, and avoidance7m 40s
-
(Locked)
Protecting sensitive data and personally identifiable information (PII)4m 44s
-
(Locked)