Methods to identify and protect against social engineering threats. This course covers various tactics used by adversaries, including phishing, pretexting, and baiting.