Log in or Sign up to track your course progress, gain access to final exams, and get a free certificate of completion!
Sarah Granger's "Social Engineering Fundamentals, Part I: Hacker Tactics"
Read this page. After you read, explain how the attacker identifies the target/victim and how to carry out social engineering via various approaches (phones, online chatting, Dumpster diving, reverse engineering etc.).