Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking: Social Engineering

Description

Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.

Tags

Syllabus

Introduction
  • Defining social engineering
  • What you should know
  • Hacking ethically
1. Grasping Social Engineering
  • Hacking the human
  • Visualize the victim
  • Skills of a social engineer
  • Recognize an attack
2. Social Engineering Mechanisms
  • Using charm, power, and influence
  • Employing browsers for social engineering
  • Evaluating add-ons and extensions
  • Deploying mobile-based attacks
  • Manipulating with social media
  • Disclosing private information
  • Challenge: Avoiding online dating scams
  • Solution: Avoiding online dating scams
3. Misusing Trust
  • Disgruntled employees
  • Steal an identity
  • Challenge: Monitoring your employees
  • Solution: Monitoring your employees
4. Penetration Testing with Social Engineering
  • Using email and websites in social engineering
  • In person and on the phone
  • Exploring the social engineering toolkit
  • Using the social engineering toolkit
5. Avoiding Social Engineering
  • Defending against social engineering
  • Understanding spam
  • Preventing insider attacks
  • Properly disposing of data and media
Conclusion
  • Next steps

Online Course


Ethical Hacking: Social Engineering

Affiliate notice

Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.

Introduction
  • Defining social engineering
  • What you should know
  • Hacking ethically
1. Grasping Social Engineering
  • Hacking the human
  • Visualize the victim
  • Skills of a social engineer
  • Recognize an attack
2. Social Engineering Mechanisms
  • Using charm, power, and influence
  • Employing browsers for social engineering
  • Evaluating add-ons and extensions
  • Deploying mobile-based attacks
  • Manipulating with social media
  • Disclosing private information
  • Challenge: Avoiding online dating scams
  • Solution: Avoiding online dating scams
3. Misusing Trust
  • Disgruntled employees
  • Steal an identity
  • Challenge: Monitoring your employees
  • Solution: Monitoring your employees
4. Penetration Testing with Social Engineering
  • Using email and websites in social engineering
  • In person and on the phone
  • Exploring the social engineering toolkit
  • Using the social engineering toolkit
5. Avoiding Social Engineering
  • Defending against social engineering
  • Understanding spam
  • Preventing insider attacks
  • Properly disposing of data and media
Conclusion
  • Next steps