* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Cybersecurity Canon](https://www2.paloaltonetworks.com/blog/category/canon/) * Cybersecurity Canon Candi... # Cybersecurity Canon Candidate Book Review: Learn Social Engineering [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F10%2Fcybersecurity-canon-candidate-book-review-learn-social-engineering%2F) [](https://twitter.com/share?text=Cybersecurity+Canon+Candidate+Book+Review%3A+Learn+Social+Engineering&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F10%2Fcybersecurity-canon-candidate-book-review-learn-social-engineering%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F10%2Fcybersecurity-canon-candidate-book-review-learn-social-engineering%2F&title=Cybersecurity+Canon+Candidate+Book+Review%3A+Learn+Social+Engineering&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2018/10/cybersecurity-canon-candidate-book-review-learn-social-engineering/&ts=markdown) \[\](mailto:?subject=Cybersecurity Canon Candidate Book Review: Learn Social Engineering) Link copied By [Ann Johnson](https://www.paloaltonetworks.com/blog/author/ann-johnson/?ts=markdown "Posts by Ann Johnson") Oct 15, 2018 4 minutes [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [Ann Johnson](https://www.paloaltonetworks.com/blog/tag/ann-johnson/?ts=markdown) [Cybersecurity Canon Review](https://www.paloaltonetworks.com/blog/tag/cybersecurity-canon-review/?ts=markdown) [Dr. Erdal Ozkaya](https://www.paloaltonetworks.com/blog/tag/dr-erdal-ozkaya/?ts=markdown) [Learn Social Engineering](https://www.paloaltonetworks.com/blog/tag/learn-social-engineering/?ts=markdown) [Social Engineering](https://www.paloaltonetworks.com/blog/tag/social-engineering/?ts=markdown) ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2017/06/cybersecuity-canon-blog-600x260.png) *We modeled the [Cybersecurity Canon](https://cybercanon.paloaltonetworks.com/) after the Baseball Hall of Fame and the Rock \& Roll Hall of Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number. Please write a review and nominate your favorite.* *The Cybersecurity Canon is a real thing for our community. We have designed it so that you can [directly participate in the process](https://cybercanon.paloaltonetworks.com/nominate-a-book/). Please do so!* Executive Summary *Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert* will equip you with a holistic understanding of social engineering. It will help you avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics ranging from baiting, phishing, and spear phishing, to pretexting and scareware. Review *Learn Social Engineering* starts with a comprehensive explanation of the concept of social engineering, which isn't a topic that is discussed enough in the cybersecurity community. We frequently discuss phishing attacks but often avoid mentioning non-technical methods used to gain information to successfully execute a spear phishing attack. After several chapters discussing the motives behind and psychology of social engineering, the book moves to recon methods, targeting, and pretexting. I found these chapters exceptional. The entire book is well-written and well-researched, but the ability to distill difficult concepts in a manner that even a non-technical individual can comprehend is a skill. It's easy to make things hard and hard to make things easy, is the conventional wisdom. After the baseline of the first chapters, we move into the actual technology and tooling for social engineering, using screen shots, known attacks, and concrete examples of the tools in action. The author discusses emails, social media, phone calls, texts, etc., as means of gathering information to launch a successful social engineering attack. He does a good job describing the tooling and its use without opining about the quality of the various methods. It is a very non-biased and academic approach, which I found refreshing. The final chapters in this book, however, are the most impactful. Having established the psychological baseline and defined social engineering and the attack methods, the author rounds out the content with expert opinions. Opinions by experts like Troy Hunt lend tremendous credibility to the topic. Because the author is based in Dubai, there is not a tendency to only have a U.S.-centric view, giving the book broader appeal. He finishes with needed reference material and source information. This book should be required reading for current cybersecurity professionals and anyone exploring a career in cybersecurity. The ability to craft the story for comprehension at all career phases is consistent throughout the book. In addition, the author is thoughtful in his coverage of the wide range of topics needed to adequately discuss social engineering. He makes certain to address the technical and non-technical aspects, as well as motives and victim impact. As an industry, we spend a tremendous amount of time discussing technology to defend attacks. We spend not enough time openly discussing the motives and non-technical methods of attackers and the actual cybercrime industry. We have a bias toward STEM graduates that needs to be challenged. I find that some of my most capable incident response folks are not STEM graduates; rather, they have a background in law enforcement, military or the intelligence community. We need to understand that cybersecurity is truly cybercrime and be able to construct a team of defenders that not only understands security tools and technologies but can actually lead an investigation from start to finish. This book is a key part of that learning. Conclusion Erdal is a colleague of mine and asked me to read this book. I did so, at first, out of a sense of duty. By the second chapter, I was grateful to HIM for making the request. It is one of the better books I have read on the subject because of the ease of understanding and the depth of content. I tend to read a lot of cybersecurity books that you simply cannot comprehend without many years of experience in the industry, specific tooling or knowledge as a security researcher. There is a place in the industry for books that give readers an understanding of attacks through tangible example, but also an understanding of the motives of the attackers. This book covers both. I would place *Learn Social Engineering* in my "Top 5" list of books I have read this year --- and yes, I'm a voracious reader. I would highly encourage everyone to read it. It is an easy read, and despite your experience, you will learn something. *** ** * ** *** ## Related Blogs ### [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Book Review: "Black Box Thinking"](https://www2.paloaltonetworks.com/blog/2020/04/cyber-canon-black-box-thinking/) ### [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Book Review: "The Cyber Conundrum"](https://www2.paloaltonetworks.com/blog/2020/04/cyber-canon-cyber-conundrum/) ### [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Book Review: "Design for How People Think"](https://www2.paloaltonetworks.com/blog/2020/04/cyber-canon-design-for-how-people-think/) ### [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Book Review: "InSecurity"](https://www2.paloaltonetworks.com/blog/2020/03/cyber-canon-insecurity/) ### [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Book Review: How America Lost Its Secrets](https://www2.paloaltonetworks.com/blog/2020/03/book-review-how-america-lost-its-secrets/) ### [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Book Review: "The Perfect Weapon"](https://www2.paloaltonetworks.com/blog/2020/03/cyber-canon-the-perfect-weapon/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language