The Art of Hacking Humans: Intro to Social Engineering

A beginner's guide to social engineering and techniques
Free tutorial
Rating: 4.1 out of 5 (254 ratings)
21,102 students
English [Auto]
Define social engineering.
Give some examples of social engineering techniques.
Explain social engineers exploit victims.
Identify common social engineering messages.


  • Basic knowledge of the Internet and networks.


We are constantly exposed to various threats regarding our information in this day-and-age. We are becoming more and more connected to networks like the Internet with a lot of our daily activities - both and work and play - revolve around a digital device or platform or the other; this increases our vulnerability to compromise by malicious attackers. A very common method used by malicious attackers to compromise information and information systems is social engineering. This takes advantage of human weakness to initiate or execute an attack or breach.

This course seeks to give a basic overview of social engineering to the beginner. It introduces the concept of social engineering and some common social engineering techniques, and how these techniques can be used to manipulate victims resulting in compromise.

Note: Although email addresses are generally redacted in sample social engineering messages shown in the course, bear in mind that any email address and names of apparent senders of such messages contained herein might be hacked. That is to say the names and email addresses that appear might belong to innocent people, but might have been hijacked.

Who this course is for:

  • Employers and employees who need to understand why their information assets need to be protected.
  • Beginner students of information security
  • Anybody who wants to learn how to be safe in the information age.

Course content

4 sections15 lectures2h 22m total length
  • Introduction
  • What is Cyber Security, what is Social Engineering?
  • Lecture 2 Quiz
    5 questions
  • Why Social Engineering?
  • Lecture 3 Quiz
    5 questions
  • Brief Historical Overview
  • Lecture 4 Quiz
    7 questions
  • Common Social Engineering Techniques


Cyber security enthusiast
Dauda Sule
  • 4.2 Instructor Rating
  • 257 Reviews
  • 21,119 Students
  • 2 Courses

Certified Information Systems Auditor (CISA) with an M.Sc. in Computer

Security, and a passion for Information Security, Assurance and Control.
Currently Marketing Executive of GGL Risk and Strategic Consulting - a
training and consulting firm that is into organizing trainings and
seminars pertaining to information and physical management, security,
assurance and control; finance; fraud prevention and detection; and
anti-money laundering.

Is an author for eForensics Magazine and
has written articles for the magazine as well as ISACA Journal; and had
written a chapter on E-discovery and forensic readiness in IGI Global's
Handbook of research on Digital Crime, Cyberspace security, and
Information Assurance. Had also delivered a workshop on eDiscovery for
eForensics Magazine, as well as a video on the IGI Global book chapter.