This book explains the most commonly executed social engineering threats. Social engineering is closely related to psychology. Social engineering can be defined as the art of manipulating people in order to achieve a goal. After reading this book you will understand why people are the weakest link in your organisation's security posture.
You will understand the following without having to understand technical stuff (e.g. source code): 1) what the most common social engineering threats and are, 2) the impact per threat for your business, 3) how these threats can be executed and / or mitigated.
This book is written for managers rather than developers. Managers must train their employees to strengthen their personal firewall (i.e. being less likely to fall victim to manipulation), because collectively all employees make up your organisation's firewall!
The CompTIA Network+ & Security+ Certification: 2 in 1 Book- Simplified Study Guide Eighth Edition (Exam N10-008) | The Complete Exam Prep with Practice Tests and Insider Tips & Tricks | Achieve a 98% Pass Rate on Your First Attempt!
Kali Linux - An Ethical Hacker's Cookbook - Second Edition: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Techniques, and Loads of Data Sources
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)