Summary
In this chapter, we looked deeply into social engineering, including techniques, and for some of them, we gave you a deep understanding of how to avoid them; most importantly, we gave you some hints on how to implement a social engineering program and why your organization needs one.
In the next chapter, we will go through vulnerability assessments and pentesting.