Social engineering can come in many forms. This course will explore social engineering, the ways it can compromise your organization's data security, and steps you can take to stay safe. At the end of the course, you'll be able to define phishing and spear phishing and how to avoid phishing scams, understand how to make good decisions when using social media, categorize the two forms of identity theft, list common examples of identity theft, and explain how to avoid it.