People Information Gathering with the Social Engineering Toolkit (SET)
Offered By: Pluralsight
Course Description
Overview
Social Engineering is one of the most common attack vectors and many people still fall victim to these attacks. In this course, you will learn Initial Access using the Social Engineering Toolkit.
Social engineering assesses people, processes, and procedures by using attack vectors such as email, malicious wireless networks and more in the attempt to breach organizational safeguards. In this course, People Information Gathering with the Social Engineering Toolkit (SET), you will cover how to utilize the Social Engineer Toolkit for Initial Access in a red team environment. First, you will demonstrate the ability to craft social engineering attacks such as spear phishing using various payloads. Next, you will work with other attack vectors within the Social Engineer Toolkit which relates to malicious payloads and integration into Metasploit. Finally, you will be able to simulate a social engineering attack. When you are finished with this course, you will have the skills and knowledge to execute these techniques these techniques: Conduct Social Engineering (T1268) and Spearphishing for information (T1397) using the Social Engineer Toolkit.
Social engineering assesses people, processes, and procedures by using attack vectors such as email, malicious wireless networks and more in the attempt to breach organizational safeguards. In this course, People Information Gathering with the Social Engineering Toolkit (SET), you will cover how to utilize the Social Engineer Toolkit for Initial Access in a red team environment. First, you will demonstrate the ability to craft social engineering attacks such as spear phishing using various payloads. Next, you will work with other attack vectors within the Social Engineer Toolkit which relates to malicious payloads and integration into Metasploit. Finally, you will be able to simulate a social engineering attack. When you are finished with this course, you will have the skills and knowledge to execute these techniques these techniques: Conduct Social Engineering (T1268) and Spearphishing for information (T1397) using the Social Engineer Toolkit.
Taught by
Rishalin Pillay
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX