In this course you will learn what social engineering is, why it matters, and who is performing it. Using case studies, you will be able to understand the techniques, tools, and vectors used in the real world.
Social engineering and physical attacks are often misunderstood and can be devastatingly easy to perform. In this course, Specialized Attacks: Physical and Social Engineering, you'll learn what social engineering and physical security are and why they matter, First, you'll discover who is performing these attacks and why, plus the tricks and techniques and how they learn them. Then, you'll see how these styles of attack fall within the remit of the law, especially for those performing these as part of a security assessment against an organization. Finally, you'll gain a deeper understanding of these attacks with the use of case studies and on-screen quizzes, and see how to defend against them in the real world. When you're finished with this course, you'll have the knowledge, understanding ,and even the skills to defend your organization against the criminals attempting these styles of attacks whilst remaining inside the boundaries of the law.
Social engineering and physical attacks are often misunderstood and can be devastatingly easy to perform. In this course, Specialized Attacks: Physical and Social Engineering, you'll learn what social engineering and physical security are and why they matter, First, you'll discover who is performing these attacks and why, plus the tricks and techniques and how they learn them. Then, you'll see how these styles of attack fall within the remit of the law, especially for those performing these as part of a security assessment against an organization. Finally, you'll gain a deeper understanding of these attacks with the use of case studies and on-screen quizzes, and see how to defend against them in the real world. When you're finished with this course, you'll have the knowledge, understanding ,and even the skills to defend your organization against the criminals attempting these styles of attacks whilst remaining inside the boundaries of the law.