Chapter 6 - Social Engineering


There is another way of trying to access confidential information: manipulating people through human interaction.

We all interact every day. Social engineering attacks can use channels such as e-mail, phone calls, messaging applications, social networks, etc.

In this chapter we will learn how to be cautious and not fall into possible traps that use social engineering.

Learning objectives

  • Risks associated with the manipulation of legitimate users
  • What precautions should we take to protect ourselves from manipulation aimed at obtaining confidential information?
  • Tips and tricks for safe social interaction

Self-assessment questionnaire

This chapter includes 5 self-assessment questions aimed at reinforcing the concepts learned and practiced in the interactive slides.

The self-assessment questions raise issues that require reflection and application of what has been learned.


  • 20 minutes