+41 (0)43 377 12 40
Novatec Cyber Security

Online course: Social Engineering

Social engineering is the targeted manipulation of people in order to obtain confidential information and data. This training course illustrates the most common danger points in a consistent story. Attackers exploit typical human behavior such as helpfulness or customer friendliness by feigning false facts. Attacks can be carried out in various ways: by telephone, e-mail or in direct conversation. The training uses numerous interactions and questions to teach the correct behavior in the event of social engineering attacks such as phishing, vishing or social media mining, as well as how to work safely in public.

Buy course voucher Start course

Social Engineering: Why is this course important?

In today's digital world, where cyber threats are ubiquitous, social engineering plays an increasingly important role. Social engineering involves techniques aimed at manipulating people to divulge confidential information. The Cyber Security course "Social Engineering" is therefore crucial for everyday work, as it educates employees on how to protect themselves from such attacks. The course covers various aspects essential in a professional context.

Access Security – Company Premises
The first step in preventing social engineering attacks is ensuring access security to company premises. The course explains the importance of preventing unauthorized individuals from entering office areas. This includes measures like access controls, ID checks, and training employees to recognize and report suspicious behavior.

New Acquaintances
New acquaintances can pose a potential security risk. The course demonstrates how attackers may try to gain trust through personal interactions to obtain confidential information. Participants learn how to handle new contacts professionally and cautiously to protect themselves from manipulation.

Social Media Mining
Social media mining refers to the collection and analysis of information from social networks. The course explains how attackers can use this information to plan targeted attacks. Participants are made aware of the information they share on social media and how to secure their profiles.

Working on the Go
Working on the go entails specific risks as mobile devices and public networks are often less secure. The course explains how to use secure connections, employ VPNs, and ensure that confidential information does not fall into the wrong hands.

Document and Data Carrier Security
Documents and data carriers must always be securely stored to prevent access by unauthorized persons. The course teaches best practices for the secure storage and disposal of sensitive information, both in physical and digital form.

Found or Free Storage Devices
Found or free storage devices, such as USB sticks, can be dangerous as they may contain malware. The course warns of the risks associated with using such devices and explains how to handle them safely.

Ransomware is a serious threat where attackers encrypt data and demand a ransom. The course teaches how to protect against ransomware attacks by regularly backing up data, using security software, and being cautious with email attachments and unknown links.

Phishing is a common method to obtain confidential information such as passwords and credit card details. The course shows how to recognize and respond to phishing attempts to ensure the security of personal data.

Vishing, or voice phishing, is a variant of phishing that occurs over the phone. The course teaches how to identify suspicious calls and the steps to take to avoid falling victim to such attacks.

Smishing, or SMS phishing, is another variant where attackers attempt to obtain confidential information through text messages. The course explains how to recognize smishing and how to handle SMS messages securely.

The Cyber Security course "Social Engineering" is essential for all employees as it imparts critical knowledge and skills to protect against the subtle and often hard-to-detect attacks of social engineering. By training in the areas mentioned, companies can significantly reduce the risk of security breaches and create a secure working environment. In a time when cyber threats are becoming increasingly sophisticated, this course provides the necessary knowledge and tools to effectively protect oneself.

More online courses

In addition to this comprehensive training, we offer a variety of other online courses to improve your professional skills. Our courses cover a wide range of topics. Each course has been developed by industry experts and provides practical knowledge and skills that you can immediately apply to your work.

Explore our full course catalog and find the right course for you. If you want to get a first impression, check out our demo course to experience our high-quality content and interactive learning environment.

all online courses Demo Online Course

Call Call Schedule Schedule Login Login Check Check