This course has been specifically designed to successfully deliver a live identity hack presentation to an Australian, American or British audience. The course goes through how to use social engineering techniques to safely identify a good volunteer. It also shows how easy it is to do identity profiling and what can be done with the information gathered for identity fraud/theft purposes. Finally, participants will learn some tips and tricks on how they can stay safer online.
Overview
Syllabus
- Module 1: Introduction
- 1.1 Introduction
- Module 2: The Set Up
- 2.1 The Set Up
- Module 3: The Profile
- 3.1 Volunteer Profile Option 1
- 3.2 Volunteer Profile Option 2
- 3.3 Volunteer Profile Option 3
- 3.4 Social Media and Social Profiling
- 3.5 Identity Profiling Examples
- Module 4: The Hack
- 4.1 Aussie Version Part 1 - Simple Hack Examples
- 4.2 Aussie Version Part 2 - Volunteer Identity Hack
- 4.3 UK Version Part 1 - Simple Hack Examples
- 4.4 UK Version Part 2 - Volunteer Identity Hack
- 4.5 American Version Part 1 - Simple Hack Examples
- 4.6 American Version Part 2 - Volunteer Identity Hack
- Module 5: Protecting Yourself
- 5.1 Protecting Yourself
- Module 6: Conclusion
- 6.1 Conclusion
Taught by
Tom Mason