Simulating real-life social engineering
Social Media Simulation / Lateral Thinking
Proofpoint’s 2024 State of the Phish report* found that 68% of employees still engage in risky actions that open the door to attackers — even when they “know better.”
Social-engineering risk is driven far more by human behavior than by technical vulnerabilities. Even well-intentioned employees can be tricked by convincing emails or oversharing on social platforms. Effective training, therefore, isn’t about listing threats — it’s about giving learners realistic practice recognizing and resisting them. This course prepares learners to spot phishing attempts and social-engineering risks by placing them inside realistic email and social-media simulations. Users interact with mock inboxes, Twitter feeds, and Facebook profiles to identify the kinds of public details that, when combined, give attackers openings to exploit.


Screenshots

Learning modalities used
Scenario-based learning (SBL)
Lateral Thinking




