Curriculum > Information Security & GDPR > Summary > IS126

Social Engineering Case Studies

Tutorial Content

At a Glance

  • Social Engineering Refresher
  • Real-World Threats
  • 3 Case Studies

In this tutorial we use recent and applicable real-world examples of successful social engineering attacks to better understand not only the tactics used by genuine attackers, but also how to mitigate this particular set of risks.

“In all these case studies, social engineering had been the initial method by which a malicious actor has gained confidential information to then use in a ‘follow on’ attack.”

- Hut Six, Social Engineering Case Studies

Learning Objectives

  • Reinforcing Preceding Social Engineering Material
  • Common Tactics
  • Impact of Social Engineering
  • Completion time: ~ 9 minutes