This course provides essential knowledge on how cybercriminals use manipulation and deception to exploit human behavior. Participants will learn to recognize social engineering tactics such as phishing, pretexting, baiting, and tailgating, and how to respond effectively to reduce risk. Ideal for individuals and organizations aiming to build a strong human firewall.
| Has discount |
![]() |
||
|---|---|---|---|
| Expiry period | Lifetime | ||
| Made in | English | ||
| Last updated at | Wed Apr 2026 | ||
| Level |
|
||
| Total lectures | 0 | ||
| Total quizzes | 0 | ||
| Total duration | 0 Hours | ||
| Total enrolment |
0 |
||
| Number of reviews | 0 | ||
| Avg rating |
|
||
| Short description | This course provides essential knowledge on how cybercriminals use manipulation and deception to exploit human behavior. Participants will learn to recognize social engineering tactics such as phishing, pretexting, baiting, and tailgating, and how to respond effectively to reduce risk. Ideal for individuals and organizations aiming to build a strong human firewall. | ||
| Outcomes |
|
||
| Requirements |
|