The Digital Deception Zone
Our data defender has arrived at the next challenge: the Digital Deception Zone! It is protected by a wall with a door that she needs a badge to get into. Since she doesn't have one, she slips in right behind someone who had access before the door closed. Which social engineering technique did she use?
This exercise is part of the course
Introduction to Data Security
Hands-on interactive exercise
Turn theory into action with one of our interactive exercises
