Ethical Hacking: Social Engineering
Offered By: LinkedIn Learning
Course Description
Overview
Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
Syllabus
Introduction
- Defining social engineering
- What you should know
- Hacking ethically
- Hacking the human
- Visualizing the victim
- Skills of a social engineer
- Recognize an attack
- Using charm, power, and influence
- Employing browsers for social engineering
- Evaluating add-ons and extensions
- Deploying mobile-based attacks
- Manipulating with social media
- Disclosing private information
- Challenge: Avoiding online dating scams
- Solution: Avoiding online dating scams
- Disgruntled employees
- Steal an identity
- Challenge: Monitoring your employees
- Solution: Monitoring your employees
- Using email and websites in social engineering
- In person and on the phone
- Exploring the social engineering toolkit
- Going phishing
- Using the social engineering toolkit
- Defending against social engineering
- Understanding spam
- Preventing spoofed email
- Preventing insider attacks
- Properly disposing of data and media
- Next steps
Taught by
Lisa Bock
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity