Attackers often use social engineering techniques to subvert existing security controls. In this video, you’ll learn about phishing, shoulder surfing, tailgating, piggybacking, and dumpster diving.
Attackers often use social engineering techniques to subvert existing security controls. In this video, you’ll learn about phishing, shoulder surfing, tailgating, piggybacking, and dumpster diving.