In this video, you will learn to; describe Phishing and Vishing campaigns, how they work and how they differ. Something else that you could do is just start something that we call a phishing campaign. There is a lot of good tools, one that I normally use is Gophish. Gophish is an open-source phishing platform that will give you a lot of tools, a lot of information to try to understand if your cybersecurity training program inside your company, inside your network is something that it's adding value to the knowledge of the users. So a quick example here is as soon as you started using the gophish in framework, you could start creating a campaign with a fake email, fake URL, and a fake HTML, and send that email to a set of users and understand if the user clicked the e-mail, if they open the e-mail, or if they add credentials into the fake URL for you to understand if all the security awareness programs that you have on your company are good enough or sufficient for the user to understand what they shouldn't do if they receive a phishing email. So another example of social engineering is these YouTube video. It's something that we call Vishing. In this video, you will see a girl talking with an agent representative from telephone company, and she will try to trick the IT guy, the support guy from telephone company to add her as one of the contacts on her husband telephone plan. But there is a couple of tweaks here, there was a couple of things. Obviously, this is a quick sample of a vishing attack. Vishing attack is something like phishing. So in phishing, you send a fake email with fake information in order to try for a user to give you something. In a vishing you are doing the same, but you are not using email, you're using your voice, so that's why we call it vishing. So I recommend you to watch this video pay close attention of the techniques that she is using in order to trick the user, the agent of the telephonic company. Basically, try to understand all the different aspects of the social media in the process. You will need to have a certain skills in order to perform these attacks because obviously, you need to have confidence, you need to have skills that will help you a lot when you're talking with somebody and try to manipulate somebody in order for you to get information.