Understanding Social Engineering

Provided by

Enquire about this course

About the course

Understanding Social Engineering

Understand social engineering awareness with online training
This course is available as part of the Compliance eLearning Suite in one great package.

Course Overview
Our Social Engineering course details all types of social engineering attacks, from baiting, phishing, spear phishing, pretexting and scare ware, giving the user important information about the ways in which each of these methods works.

The online training also comprehensively details ways in which you can avoid falling victim to social engineering.

 Course Duration: 5 minutes 
Available in: 1 Language

Tagged in: Cyber Security, Information Security 

Technical Requirements
CPD: This course is eligible for CPD points.

Tailoring: You can tailor this course using the free Adapt Authoring Tool.

What to Expect
Suitable for all levels of team members, upon completion, your business will be able to:


  • Measure and determine your preparedness level for attacks
  • Promote vigilance and implement procedures to defeat scams
  • Mitigate personal and professional vulnerabilities with security awareness
  • Plan and evaluate security assessments for gaps and weaknesses
  • Defend yourself and others against social engineering deceptions

Social engineering describes the psychologically manipulative ways hackers and criminals access confidential information, like passwords and bank information. Methods included in this manipulation include pretexting, spear phishing, and clone phishing, amongst a whole host of others (for more information, see phishing awareness training).

Recognising and combating social engineering in the workplace is paramount to your business' cyber security and information security.

Guide Pricing
Subscribe to Compliance Essentials for a library of eLearning courses to meet your governance, risk management and compliance (GRC) training requirements. Subscription includes delivery through our Astute eLearning Platform, putting you in control of your compliance training programme all year round.


Start date Location / delivery
No fixed date Online

Related article

Cyber security – why bother? Most people’s perception of cyber-attacks are either of someone in a darkened room trying to take down web sites, or c...