Skip to content
Back to courses
Social Engineering Security Scams Phishing Team Training

Corporate Defense Protocol: Train Your Team to Detect and Block Scams

> Your biggest security breach isn't software, it's a conversation_

The most dangerous attackers don't use code to get into your systems: they use trust. A phone call, a convincing email, or a well-told story.

Duration

1.52 hours

Format

Online on-demand

Level

Beginner

Price

€60

Note: This course is currently only available in Spanish. Contact us if you're interested in an English version.

If you search the internet for how to protect your company, you’ll find hundreds of solutions: antivirus, firewalls, intrusion detection systems…

But almost no one tells you about the threat that can’t be patched. The one that walks through the front door or calls on the phone.

Jessica’s Story

A security expert was challenged by a journalist at a conference. The challenge: “Can you steal my data by calling my phone company?”

With the sound of a crying baby in the background, she posed as the journalist’s stressed wife. In less than 10 minutes, she had full control of the account. WITHOUT WRITING A SINGLE LINE OF CODE.

What you’ll learn

  • Did you know that the sound of a crying baby can be a weapon to steal passwords?
  • Why remembering someone’s name is the oldest and most effective manipulation technique
  • The 3 pieces of data your employees post on social media that an attacker will use against them
  • How an attacker uses the “authority principle” to impersonate an executive
  • The “save face” technique that scammers use
  • The 5 most common phrases manipulators use to create urgency
  • Why hanging up and calling back is the most powerful weapon

Curriculum

Chapter 1: Introductions

  • Course introduction
  • Why social engineering works

Chapter 2: How a social engineering attack is carried out

  • Analysis of real attack scripts
  • The 7 most common manipulation tactics
  • The authority principle
  • Urgency as a weapon
  • Real examples analyzed phrase by phrase

Chapter 3: Why does all this work?

  • Attacker psychology
  • The Steve Jobs technique that scammers use
  • How they exploit the desire to “be helpful”
  • Simple verification protocol

Additional Material

  • Mental defense framework
  • Verification protocol for employees

Who is this course for?

  • Executives and managers who want to protect their teams
  • HR professionals who train new employees
  • IT teams who manage support and access
  • Any professional who handles calls or emails from clients

Prerequisites

  • No prior technical knowledge required
  • You just need to want to protect your team

What’s included

  • 1.52 hours of video direct and no filler
  • 18 practical lessons
  • Mental defense framework to think like a skeptic
  • Verification protocol that any employee can apply
  • Lifetime access with no expiration
  • Certificate of completion
// Contact

Interested in this course?

Tell us about your team and we'll prepare a personalized proposal

Request information

Write to us with the number of people and approximate dates. We'll respond within 24 hours.

hello@alicebob.io