Social Engineering Attacks

In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.

Faculty Authors

By
08.26.16

Last Updated 08.26.16

Social Engineering Attacks has been viewed 144 times.

Creative Commons License
Social Engineering Attacks by Fox Valley Technical College is licensed under a Creative Commons Attribution 4.0 International License.

This workforce product was funded by a grant awarded by the U.S. Department of Labor’s Employment and Training Administration. The product was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The U.S. Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability, or ownership. This is an equal opportunity program. Assistive technologies are available upon request and include Voice/TTY (771 or 800-947-6644).

Interface Logo