Social engineering targets people, not computers. Ethical hackers study it to prevent attacks.
Common Techniques
Phishing
Pretexting
Baiting
Impersonation
Defense Strategies
User training
Verification procedures
Security awareness
Social engineering must only be simulated with permission.
Lesson 13 of 16