
Sign up to save your podcasts
Or


Not all threats are technical—some are psychological. This episode focuses on social engineering attacks, which trick users into revealing information or granting access through manipulation rather than code. We start with phishing, covering both traditional email attacks and newer variants like spear phishing and smishing. You’ll learn what signs to look for and how users can be trained to respond appropriately.
We then explore impersonation, where attackers pose as trusted figures like IT staff or executives to gain access or install malware, and tailgating, which involves physically following someone into a restricted area. These techniques are often the first step in a broader attack and are frequently included in exam scenarios involving user behavior or access violations. Brought to you by BareMetalCyber.com.
By Dr. Jason Edwards5
22 ratings
Not all threats are technical—some are psychological. This episode focuses on social engineering attacks, which trick users into revealing information or granting access through manipulation rather than code. We start with phishing, covering both traditional email attacks and newer variants like spear phishing and smishing. You’ll learn what signs to look for and how users can be trained to respond appropriately.
We then explore impersonation, where attackers pose as trusted figures like IT staff or executives to gain access or install malware, and tailgating, which involves physically following someone into a restricted area. These techniques are often the first step in a broader attack and are frequently included in exam scenarios involving user behavior or access violations. Brought to you by BareMetalCyber.com.

228,911 Listeners

27,888 Listeners

231 Listeners

6,417 Listeners

8,066 Listeners

368,947 Listeners

45,416 Listeners

1,413 Listeners

20 Listeners

8,030 Listeners

19 Listeners

3 Listeners

5 Listeners

0 Listeners

3 Listeners