This document provides an introduction to social engineering techniques. It describes common social engineering attacks like phishing emails, baiting websites, spear phishing targeted attacks, watering hole attacks, and physical baiting. Phishing remains the most prolific attack, while more sophisticated methods focus targets and use multiple layers. Effective defenses include educating users about social engineering techniques and promoting an organizational culture of information security awareness. However, a skilled attacker can still successfully retrieve information through social engineering given enough resources and luck. Organizations should have response and recovery plans for successful attacks.