From the course: Cybersecurity Awareness: Social Engineering

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Challenge: Social engineering tactics

Challenge: Social engineering tactics

(upbeat music) - [Instructor] Now it's time for this chapter's challenge. I'll present a scenario and it's up to you as the newest cybersecurity expert to figure out what social engineering attacks are being used. As you come across each of the five social engineering attacks, type your guesses into the course's note-taking feature. Then we'll discuss the answers in the solution video. It's Monday morning and Laura is running late. She dashes into the building and badges in. She sees her coworker Gabriel rushing in behind her. She waves hello and notices Gabriel holding the door for someone she doesn't recognize. She doesn't have time to think about it so she hops on the elevator and rushes to her desk. As she logs in, she hears a voice near her ear, "Morning." She whirls around and sees Victor, a coworker standing behind her. "Logging in?" Victor asks, Laura smiles and chats with him for a bit. When they're done, she…

Contents