Ethical Hacking: Social Engineering
Offered By: LinkedIn Learning
Course Description
Overview
Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
Syllabus
Introduction
- Defining social engineering
- What you should know
- Hacking ethically
- Hacking the human
- Visualizing the victim
- Skills of a social engineer
- Recognize an attack
- Using charm, power, and influence
- Employing browsers for social engineering
- Evaluating add-ons and extensions
- Deploying mobile-based attacks
- Manipulating with social media
- Disclosing private information
- Challenge: Avoiding online dating scams
- Solution: Avoiding online dating scams
- Disgruntled employees
- Steal an identity
- Challenge: Monitoring your employees
- Solution: Monitoring your employees
- Using email and websites in social engineering
- In person and on the phone
- Exploring the social engineering toolkit
- Going phishing
- Using the social engineering toolkit
- Defending against social engineering
- Understanding spam
- Preventing spoofed email
- Preventing insider attacks
- Properly disposing of data and media
- Next steps
Taught by
Lisa Bock
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent