Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
Tags
Syllabus
Introduction
- Defining social engineering
- What you should know
- Hacking ethically
- Hacking the human
- Visualize the victim
- Skills of a social engineer
- Recognize an attack
- Using charm, power, and influence
- Employing browsers for social engineering
- Evaluating add-ons and extensions
- Deploying mobile-based attacks
- Manipulating with social media
- Disclosing private information
- Challenge: Avoiding online dating scams
- Solution: Avoiding online dating scams
- Disgruntled employees
- Steal an identity
- Challenge: Monitoring your employees
- Solution: Monitoring your employees
- Using email and websites in social engineering
- In person and on the phone
- Exploring the social engineering toolkit
- Using the social engineering toolkit
- Defending against social engineering
- Understanding spam
- Preventing insider attacks
- Properly disposing of data and media
- Next steps
Ethical Hacking: Social Engineering
Affiliate notice
-
TypeOnline Course
-
Provider
Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
Introduction
- Defining social engineering
- What you should know
- Hacking ethically
- Hacking the human
- Visualize the victim
- Skills of a social engineer
- Recognize an attack
- Using charm, power, and influence
- Employing browsers for social engineering
- Evaluating add-ons and extensions
- Deploying mobile-based attacks
- Manipulating with social media
- Disclosing private information
- Challenge: Avoiding online dating scams
- Solution: Avoiding online dating scams
- Disgruntled employees
- Steal an identity
- Challenge: Monitoring your employees
- Solution: Monitoring your employees
- Using email and websites in social engineering
- In person and on the phone
- Exploring the social engineering toolkit
- Using the social engineering toolkit
- Defending against social engineering
- Understanding spam
- Preventing insider attacks
- Properly disposing of data and media
- Next steps
Loading...
Saving...
Loading...