Social Engineering types
Phishing, Spear-phishing, Whaling, Vishing, Pharming, Impersonation, Piggybacking/Tailgating, Honey Trap, Diversion Theft, Quid pro Quo, etc..
Identity-theft techniques
Discuss the various methods of social engineering that can lead to identity theft.
Changing the source address of your e-mail to appear as if it came from someone else
MiTM attack framework for setting up phishing/pharming pages and then stealing credentials from victims (similar to SET - Social Engineering Toolkit, which can do the same)