Cybersecurity Awareness for Employees: Social Engineering

Social engineering is the art of extorting information from employees that can assist a hacker to breach the security of an organization and can be done by a human or it can be done digitally. In this interactive online course we will define phishing and identify common features, examples, and how to avoid phishing scams. We will also discuss identity theft and how to protect against it.

Request a demo

Course Details

Learning Objectives

At the end of this course, you will be able to:
  • Define phishing
  • Identify common features and examples of phishing
  • Describe how to avoid phishing scams
  • Define spear phishing
  • Describe how to avoid spear phishing scams
  • Select the best advice when using social media
  • Categorize the two forms of identity theft
  • List common examples of identity theft
  • Describe how to protect against identity theft

Specs

Course Level Fundamental
Languages English
Compatibility Audio, Video, MobileReady

Hanna Haddad

Hanna has been in the Information Technology industry for over 11 years mastering disciplines in Cyber Security, Virtualization, Internet Technology and Information Systems. Hanna is bilingual and works as both a consultant and master mile2 instructor in the United States, Europe and Asia. Hanna has a long history in the INFOSEC industry. He1€™s been involved in high level projects that not only range from securing virtualization environments, but also implementing complex controls to ensure network security. Hanna has many expertise and has been involved in the following disciplines for over 10 years in both the private and public sector:
  • Microsoft Systems: AD, DNS, DHCP, MS Exchange, SQL, ISA, TMG, SCCM, VDI
  • VMWare: ESXi, vSphere, VSAN, Horizon View
  • Cisco: Switching, Routing, Firewall (ASA), VOIP
  • Security: Penetration Testing, Vulnerability Assessment, Incident Handling
  • Linux: used Linux (Ubuntu, Fedora, Debian) for Penetration testing
  • Firewall: Palo Alto, Astaro, ASA, Fortinet, Forefront
  • Storage: SAN, NAS, VSAN (VMWare SAN)
  • Disaster Recovery and Business Continuity
Hanna is a mile2 master instructor and has obtained the following certifications with Mile2, Microsoft, EC-Council and Comptia (The is not an exhaustive list of courses Hanna can teach):
  • Mile2: CPTE - Certified Penetration Testing Engineer, CPEH - Certified Professional Ethical Hacker, CIHE 1 Certified Incident Handling Engineer, CDRE 1 Certified Disaster Recovery Engineer, CDFE 1 Certified Digital Forensics Examiner
  • Microsoft Certifications: Microsoft Certified Solutions Associate, Microsoft Certified Trainer, Microsoft1® Certified IT Professional (MCITP), Microsoft1® Certified Technology Specialist (MCTS), Microsoft Certified Solutions Expert in Private Cloud (MCSE), Microsoft Certified Solutions Expert in Server Infrastructure (MCSE)
  • EC-Council Certifications: Certified Ethical Hacker (E | CEH), Certified EC-Council Instructor (CEI), Certified Security Analyst (E | CSA), Disaster Recovery Professional (E | DRP)
  • CompTIA Certifications: Security+
Hanna is responsible for developing Cloud Security courses, Comptia+ Cloud+ and Mile1s Certified Professional Ethical Hacker.

Course Applies To

Demos + Pricing

Learn more about our courses, get pricing, and see our platform.

Trusted by 24,000+ Industry Leaders