Exploration should include
comparing the types of social engineering
impersonation
dumpster diving
shoulder surfing
lunchtime attack
tailgating
phishing
whaling
vishing
pharming
hoaxing
identifying ways to troubleshoot social engineering attacks.