Beyond email, students explore baiting, pretexting, and quid pro quo attacks. They participate in role-playing exercises to see how easily people give up information when they trust the requester.

Similar Lessons