Today’s SY0-501 Security+ Pop Quiz: We’ll wait for a sale
Today’s SY0-501 Security+ Pop Quiz: We’ll wait for a sale Read More »
Social engineering attackers know how to convince their victims to get information. In this video, you’ll learn the principles of social engineering and how to watch for these methods of manipulation. << Previous Video: Other Social Engineering Attacks Next: An Overview of Malware >> Social engineering is a constantly changing attack, and that’s
Principles of Social Engineering – SY0-601 CompTIA Security+ : 1.1 Read More »
Social engineering attacks can come from anywhere at any time. In this video, you’ll learn about tailgating, invoice scams, and credential harvesting. << Previous Video: Influence Campaigns Next: Principles of Social Engineering >> If you work in an office where you badge in to unlock a door to gain access to the inside,
Other Social Engineering Attacks – SY0-601 CompTIA Security+ : 1.1 Read More »
Is what you’re seeing online real, or a work of fiction? In this video, you’ll learn about influence campaigns and how fake users can be used to manipulate the thoughts and minds of large groups. << Previous Video: Spam Next: Other Social Engineering Attacks >> The advent of social media has dramatically changed
Influence Campaigns – SY0-601 CompTIA Security+ : 1.1 Read More »
If you have an email address, then you probably know about spam. In this video, you’ll see some examples of spam from my junk mail folder and you’ll learn techniques for identifying and rejecting incoming spam messages. << Previous Video: Watering Hole Attacks Next: Influence Campaigns >> Most of us are pretty familiar
A cybersecurity professional has to be prepared at home and away. In this video, you’ll learn about watering hole attacks and how an attacker can use a third-party to gain access to your network. << Previous Video: Hoaxes Next: Spam >> An organization that is very secure creates a problem for attackers. They’re
Watering Hole Attacks – SY0-601 CompTIA Security+ : 1.1 Read More »
It’s the Internet, so you can’t believe everything you see or read. In this video, you’ll learn how to identify hoaxes and I’ll share some hoaxes that I’ve found during my normal workday. << Previous Video: Shoulder Surfing Next: Watering Hole Attacks >> In the world of IT security, a hoax is a
Someone looking over your shoulder can uncover all of your secrets. In this video, you’ll learn about shoulder surfing and how you can prevent unwanted screen views. << Previous Video: Dumpster Diving Next: Hoaxes >> The things that you have on your computer might be important spreadsheets, documents, presentations, and things that you
Shoulder Surfing – SY0-601 CompTIA Security+ : 1.1 Read More »
A key technique for the social engineering attacker is their ability to pretend to be someone they aren’t. In this video, you’ll learn how attackers use impersonation to gain access to information and commit identity fraud. << Previous Video: Phishing Next: Dumpster Diving >> All of the good attackers are very good at