Hacking Humans - Social Engineering Techniques and How to Protect Against Them

Hacking Humans - Social Engineering Techniques and How to Protect Against Them

NDC Conferences via YouTube Direct link

Information Gathering

13 of 21

13 of 21

Information Gathering

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hacking Humans - Social Engineering Techniques and How to Protect Against Them

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Disclaimer
  3. 3 3 Methodologies
  4. 4 Statistics : Phishing
  5. 5 Statistics : Impersonation
  6. 6 Types of Social Engineer
  7. 7 Why Social Engineering?
  8. 8 Common Attacks
  9. 9 Kevin Mitnick
  10. 10 Frank Abagnale
  11. 11 Charles Ponzi
  12. 12 Social Engineering Techniques
  13. 13 Information Gathering
  14. 14 Questioning Techniques
  15. 15 Funneling
  16. 16 Pretexting vs Elicitation
  17. 17 Manipulation - Fear
  18. 18 Manipulation - Guilt
  19. 19 Manipulation - Foot in the Door
  20. 20 Personal Mitigation Techniques
  21. 21 Corporate Mitigation Techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.