View on GitHub

Lecture Series

Python, AI, and Cybersecurity Resources

🏠 Home > Cybersecurity > Personal Defense > Module 2

Module 2: Countering Social Engineering & AI Scams

Overview

This module teaches students to recognize and defend against sophisticated social engineering attacks, including AI-powered scams. Learn to identify deepfakes, phishing attempts, and psychological manipulation tactics used by cybercriminals.

Learning Duration

[To be determined]

Prerequisites


Topics

2.1 Spotting Deepfakes: Audio (Vishing) and Video Verification

Key Concepts:

Content Areas:

[Detailed content to be added]


2.2 Phishing 2.0: Identifying Sophisticated AI-Generated Emails

Key Concepts:

Content Areas:

[Detailed content to be added]


2.3 Smishing & QR Code Fraud (Quishing)

Key Concepts:

Content Areas:

[Detailed content to be added]


2.4 Psychological Triggers in Cyber Scams

Key Concepts:

Content Areas:

[Detailed content to be added]


Practical Exercises

Exercise 1: Deepfake Detection Challenge

Objective: Identify deepfake content from real content Duration: [To be added] Activities:

Exercise 2: Phishing Email Analysis

Objective: Identify phishing indicators in sample emails Duration: [To be added] Skills Practiced:

Exercise 3: Smishing Scenario Response

Objective: Respond appropriately to SMS scam scenarios Duration: [To be added] Steps: [To be added]

Exercise 4: Psychological Trigger Recognition

Objective: Identify manipulation tactics in scam examples Duration: [To be added] Steps: [To be added]


Real-World Examples

Case Study 1: Voice Clone Scam

Scenario: [To be added] Red Flags: [To be added] Proper Response: [To be added]

Case Study 2: Sophisticated Phishing Attack

Scenario: [To be added] Red Flags: [To be added] Proper Response: [To be added]

Case Study 3: QR Code Parking Scam

Scenario: [To be added] Red Flags: [To be added] Proper Response: [To be added]


Quick Reference: Red Flags Checklist

Email Red Flags

Phone/Text Red Flags

Deepfake Indicators


Response Protocols

If You Receive a Suspicious Call

  1. [Steps to be added]
  2. Hang up and call back using official number
  3. Never provide personal information
  4. Report the incident

If You Receive a Suspicious Email

  1. [Steps to be added]
  2. Don’t click links or download attachments
  3. Verify sender through alternate channel
  4. Report as phishing

If You’ve Been Scammed

  1. [Steps to be added]
  2. Report to authorities
  3. Monitor accounts
  4. Update passwords

Assessment

Knowledge Check

Scenario-Based Assessment

Title: Scam Response Challenge Description: [To be added] Scenarios: [To be added]


Resources

Reporting Tools

Verification Tools

Educational Resources

Further Reading


Last Updated: 2026-01-07