• Online, Self-Paced
Course Description

In this course, you'll examine multiple examples of social engineering attacks that you should be familiar with as an analyst. Attacks are not always easily identified, so you'll learn about the different evasion and obfuscation techniques. Finally, you'll learn about the different components of digital certificates and what these components do. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.

Learning Objectives

{"identify the different types of social engineer attacks involving email messages or text messages","recognize the attack type that involves infecting a website that is commonly visited by intended victims","identify the attack type that involves the hacker creating a fake identity"}

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operational Planning
  • Cyber Operations
  • Cybersecurity Management
  • Executive Cyber Leadership
  • Network Services
  • Threat Analysis

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.