Social Engineering Techniques in Cybersecurity: Complete Theoretical Guide