Skip to content

Social Engineering – Learning

Overview

The following learning resources are provided to assist faculty, students, staff (including student employees) in identifying cybersecurity learning resources.  In addition to being grouped by Content Area or Role, each resource page has content from three sources:

  • Internally produced content - primarily identified as Cyber Talks delivered by GW cybersecurity staff
  • Third-party produced content - primarily from KnowBe4
  • LinkedIn provided content - primarily what is available to employees through Talent@GW

The page references two primary locations for content

  • myGW Group CyberSafe GW
    • Content will a "location" of myGW Group - CyberSafe GW describe content available through our myGW group that any GW account holder can access.  These item's titles will often link directly to the content for authenticated GW users.
  • Talent@GW
    • Items with a "Location" of Talent@GW will also require authentication and are currently limited to GW employees.  Please note that the best way to find these items is searching for them in Talent@GW using the title.  Also, these items maybe available in other LinkedIn subscriptions, so searching for them there may also provide access.

Finally, this page includes notes as to the length of the material, type/format, and suggested audiences that would find the information most relevant.


Cyber Talk - Social Engineering - Phishing, Smishing and Vishing Explained

  •  
  •  

Document Sharing Security Tips: How to Stay Safe with Shared Docs

  • Audience: Faculty, Students and Staff (including student employees)
  • Location: National Cybersecurity Awareness (Articles)
  • Duration: 5 minute read
  • Type: External Web Resource
  • Source:  National Cybersecurity Alliance
In both our professional and personal lives, shared documents are an integral part of how we connect with others. No matter whether you're collaborating on a Google Doc, reviewing a shared PDF, or emailing a link to a Microsoft Word file, these programs are very common. However, while these tools facilitate collaboration, they can also open the door to security risks if not used with care. 

Social Engineering: Cyberattacks Using Emotional Manipulation 

  • Audience: Faculty, Staff (including student employees)
  • Location: Talent@GW
  • Duration: 5 minutes
  • Type: Training Module
    Social engineering is one of the most effective methods used by cybercriminals to gain access to confidential information. This training provides participants with a deep understanding of why social engineering is so successful and how it works. You will learn about the emotional manipulation that attackers use to trick people. The course covers different types of social engineering attacks and uses practical examples to show how to recognize and respond to suspicious requests. Particular emphasis is placed on developing critical awareness in high-pressure situations. Participants will learn effective defense strategies and interactive exercises and a knowledge check  quiz will strengthen your ability to contribute to cybersecurity - both in your professional and private lives.

Knowbe4 Pretexting - 'Tech Support' Social Engineering

  • Audience: Faculty, Staff (including student employees)
  • Location:Talent@GW
  • Duration: 5 minutes
  • Type: Video Module
    In this video module Kevin Mitnick (world renowned security consultant, public speaker and author) and Rachel Tobac (social engineer and the CEO / Co-founder of SocialProof Security) roleplay a social engineering attack using pretexting. Pretexting is a form of social engineering where the attacker lies to obtain restricted information. Rachel demonstrates and explains how an attacker can gain information about your organization's defenses by pretending to be a member of the tech support team and how this can lead to your organization's network being compromised.

Knowbe4 Pretexting - Fake IT Attack

  • Audience: Faculty, Staff (including student employees)
  • Location: Talent@GW
  • Duration: 5 minutes
  • Type: Video Module
    In this video module Kevin Mitnick (world renowned security consultant, public speaker and author) and Rachel Tobac (social engineer and the CEO / Co-founder of SocialProof Security) roleplay a social engineering attack using pretexting. Pretexting is a form of social engineering where the attacker lies to obtain restricted information. In this attack, Kevin explains how he is able to steal the local password and the password for the HR system by pretending to be a member of the IT team.

Knowbe4 Pretexting - Fake IT Password Break-In

  • Audience: Faculty, Staff (including student employees)
  • Location: Talent@GW
  • Duration: 5 minutes
  • Type: Video Module
    In this video module Kevin Mitnick (world renowned security consultant, public speaker and author) and Rachel Tobac (social engineer and the CEO / Co-founder of SocialProof Security) roleplay a social engineering attack using pretexting. Pretexting is a form of social engineering where the attacker lies to obtain restricted information. Rachel demonstrates and explains how an attacker can gain access to your organization's network by pretending to be a member of the tech support team and asking you to change your password. She also provides tips on having a password that is less likely to be cracked by hackers.

Knowbe4 Pretexting Two-Factor Authentication Attack

  • Audience: Faculty, Staff (including student employees)
  • Location: Talent@GW
  • Duration: 5 minutes
  • Type: Video Module
    n this video module Kevin Mitnick (world renowned security consultant, public speaker and author) and Rachel Tobac (social engineer and the CEO / Co-founder of SocialProof Security) role play a social engineering attack using pretexting. Pretexting is a form of social engineering where the attacker lies to obtain restricted information. Kevin demonstrates and explains how an attacker can gain access to your organization's network by social engineering a user and getting them to divulge their two-factor authentication code

 


unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and  Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


IT Support Questions? For IT support, please contact the Information Technology Support Center at 202-994-GWIT (4948), ithelp[@]gwu.edu, or visit ithelp.gwu.edu