Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
Overview
Syllabus
Introduction
- Defining social engineering
- What you should know
- Hacking ethically
- Hacking the human
- Visualizing the victim
- Skills of a social engineer
- Recognize an attack
- Using charm, power, and influence
- Employing browsers for social engineering
- Evaluating add-ons and extensions
- Deploying mobile-based attacks
- Manipulating with social media
- Disclosing private information
- Challenge: Avoiding online dating scams
- Solution: Avoiding online dating scams
- Disgruntled employees
- Steal an identity
- Challenge: Monitoring your employees
- Solution: Monitoring your employees
- Using email and websites in social engineering
- In person and on the phone
- Exploring the social engineering toolkit
- Going phishing
- Using the social engineering toolkit
- Defending against social engineering
- Understanding spam
- Preventing spoofed email
- Preventing insider attacks
- Properly disposing of data and media
- Next steps
Taught by
Lisa Bock