YoVDO

Information Gathering and Social Media Attacks to Gain Access

Offered By: YouTube

Tags

SkyDogCon Courses Cybersecurity Courses Ethical Hacking Courses Digital Forensics Courses Information Gathering Courses Man in The Middle Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore information gathering techniques and social media attacks in this 35-minute conference talk from SkyDogCon 2011. Delve into the Evil Twin Attack, its origins, and mechanics through practical examples. Learn about creating fake LinkedIn accounts for information gathering, including profile creation and connecting individuals. Examine social media attack strategies, focusing on Facebook takeovers using tools like Firesheet and Firesheep. Discover social media tools like MarketMe and gain insights into enhancing social media security. Conclude with a discussion on the importance of documentation and contact information in cybersecurity.

Syllabus

Intro
Evil Twin Attack
The Evil Twin Attack
How this got started
How it works
Example
Information gathering
Fake LinkedIn accounts
LinkedIn information gathering
LinkedIn pictures
Linking people together
Filling out the profile
Social media attacks
Documentation
Evil Twin
Man in the Middle
Tools needed
Firesheet
Firesheep
Taking over Facebook
Social media tools
Marketme
Social Media Security
Contact Info


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network