top of page
website_icon_social-engineering.png

Simulating real-life social engineering

Social Media Simulation / Lateral Thinking

Proofpoint’s 2024 State of the Phish report* found that 68% of employees still engage in risky actions that open the door to attackers — even when they “know better.”

Social-engineering risk is driven far more by human behavior than by technical vulnerabilities. Even well-intentioned employees can be tricked by convincing emails or oversharing on social platforms. Effective training, therefore, isn’t about listing threats — it’s about giving learners realistic practice recognizing and resisting them. This course prepares learners to spot phishing attempts and social-engineering risks by placing them inside realistic email and social-media simulations. Users interact with mock inboxes, Twitter feeds, and Facebook profiles to identify the kinds of public details that, when combined, give attackers openings to exploit.

NKL_M291_010.jpg
social-engineering_background.png

Screenshots

Learning modalities used

Scenario-based learning (SBL)

Lateral Thinking

Modalities
bottom of page