Specialized Attacks: Physical and Social Engineering
Offered By: Pluralsight
Course Description
Overview
In this course you will learn what social engineering is, why it matters, and who is performing it. Using case studies, you will be able to understand the techniques, tools, and vectors used in the real world.
Social engineering and physical attacks are often misunderstood and can be devastatingly easy to perform. In this course, Specialized Attacks: Physical and Social Engineering, you'll learn what social engineering and physical security are and why they matter, First, you'll discover who is performing these attacks and why, plus the tricks and techniques and how they learn them. Then, you'll see how these styles of attack fall within the remit of the law, especially for those performing these as part of a security assessment against an organization. Finally, you'll gain a deeper understanding of these attacks with the use of case studies and on-screen quizzes, and see how to defend against them in the real world. When you're finished with this course, you'll have the knowledge, understanding ,and even the skills to defend your organization against the criminals attempting these styles of attacks whilst remaining inside the boundaries of the law.
Social engineering and physical attacks are often misunderstood and can be devastatingly easy to perform. In this course, Specialized Attacks: Physical and Social Engineering, you'll learn what social engineering and physical security are and why they matter, First, you'll discover who is performing these attacks and why, plus the tricks and techniques and how they learn them. Then, you'll see how these styles of attack fall within the remit of the law, especially for those performing these as part of a security assessment against an organization. Finally, you'll gain a deeper understanding of these attacks with the use of case studies and on-screen quizzes, and see how to defend against them in the real world. When you're finished with this course, you'll have the knowledge, understanding ,and even the skills to defend your organization against the criminals attempting these styles of attacks whilst remaining inside the boundaries of the law.
Syllabus
- Course Overview 1min
- Course Foundations 8mins
- Let's Break into a Bank! 22mins
- I Am Thirsty for More, What Next? 2mins
Taught by
FC
Related Courses
Cyber Security Foundations: Common Malware Attacks and Defense StrategiesEC-Council via FutureLearn Cyber Security Incident Response for Managers
PA Consulting via FutureLearn Cybersecurity in Healthcare (Hospitals & Care Centres)
Erasmus University Rotterdam via Coursera Avoiding Phishing Scams
LinkedIn Learning Become an Ethical Hacker
LinkedIn Learning