Let's go on to the conclusion.
In today's lecture, we've discussed how you can use social engineering to choose a willing volunteer.
We've also shown how a hacker can use simple information to, though identity theft, which is a person's name, address and date of birth.
But more importantly, what we've shown people is how they can stay safe online.
I'd like to thank you for participating in this course, and I hope that you found it informative.
I look forward to seeing you on the next cyber recourse. Thank you.