PECB Training center
  • HOME
  • ISO 31000
  • CYBER DEFENCE
    • Using indicators to enhance defense capabilities​​​
    • Vulnerability Handling
    • Proactive detection of incidents
    • Presenting, correlating and filtering various feeds
  • GDPR
  • Contact

ICT SECURITY 2016

​Anatomy of a Social engineering attack

Anatomy of a Social Engineering Attack


In this lecture, we'll "dissect" a most often types of social engineering attacks. We'll try to explain why are SE attacks so powerful, what are the mechanisms behind it (technical and psychological) and finally, what can we do prevent them within our organization.

Proudly powered by Weebly
  • HOME
  • ISO 31000
  • CYBER DEFENCE
    • Using indicators to enhance defense capabilities​​​
    • Vulnerability Handling
    • Proactive detection of incidents
    • Presenting, correlating and filtering various feeds
  • GDPR
  • Contact