Social Engineering Training
Social engineering has proved to be one of the most prolific & effective means of attacking organisations of all sizes. Phishing attacks alone are responsible for over 80% of security incidents and 94% of Malware is delivered by email.
Cyber-attacks involving social engineering are rarely out of the headlines. Cases involving ransomware are hard to hide when all your systems are out of use, but apart from large scale ransomware and reportable data loss where a company has to tell a regulator, it is likely that a vast amount of social engineering attacks are going unreported.
This course equips your employees with the skills to identify & combat social engineering attacks such as not clicking malicious links or opening phishing emails. We follow nationally set standards and best practice to ensure you get the best awareness training possible for your employees.
Certified Social Engineering Training
By having your teams complete a NCSC certified training course you can demonstrate a commitment to cyber security to your clients and know the content is in line with established best practice.
Fun and Engaging
Over the years we have received compliments from students and training managers on how refreshing the course is. We look at good security hygiene from a different perspective ensuring the student’s learning journey is fun, consumable and memorable.
Understand what social engineering is and why it is so effective
Be able to spot the tell tale signs of manipulation and deception
Reduce your personal attack surface and be safer online
Defend Your Organisation
Block and report social engineering attempts in your organisation
Social engineering is a common attack vector
This is an awareness level course. It is suitable for all company staff and has been designed to be practical and easily understood by anyone. Our clients often employ it to provide their “high risk” staff with more in-depth training.
All our NCSC certified social engineering courses are taught by award-winning cyber security expert Lisa Forte.
The course can be run remotely (Teams, Webex etc) or face to face if circumstances allow.
Students get a certificate of completion of a NCSC accredited course to evidence their training. This benefits their CPD and demonstrates your commitment to cyber security both to your clients & the ICO under the GDPR.
The course lasts for 4 hours Including the exam. This means your staff don’t miss an entire day off work so the course causes minimal operational disruption. Alternatively there is a 2 hour, non-NCSC certified course which has the core elements of the 4 hour course but is not certified by the NCSC. Contact us for more information.
With the abundance of cyber security training courses on offer it can be difficult for customers to identify highly competent trainers and good quality courses. NCSC Certified Training addresses this issue- providing customers with a choice of rigorously assessed training providers, thus they can feel confident they’ll receive training that is consistent with industry best practice.
Get in touch to discuss how we can help you achieve your security awareness or resilience goals.
Lisa Forte – Darknet Diaries
One of our Partners, Lisa Forte, was asked to be a guest on what is perhaps the most popular and influential…
Would you fall for a $35m voice cloning attack?
A high tech vishing attack utilising voice cloning has lost a UAE bank 35 Million USD. What happened? According to the court documents: the Victim […]
Defcon Talk: Using SE to create insider threats and win all the things
Lisa Forte’s Defcon 2021 talk on social engineering and insider threat. Transcript to follow.
The 5 Best Ways to Spot TV Licence Phishing Emails
TV Licence Phishing Emails In the UK a licence is required to watch live TV in the home. With lockdown continuing and people’s reliance on […]
What is Vishing?
What is vishing? How to How to defend your organisation against telephone-based vishing scams
How voice assistants can be used to phish passwords
We have seen a wealth of articles on the security and privacy issues around voice assistants. This week I came across and new and far […]