Under the Influence - The Dark Side of Influence
Offered By: YouTube
Course Description
Overview
Explore the dark side of influence and social engineering in this 54-minute conference talk from Converge 2015. Delve into topics such as the identity paradox, risk management, and how to stop hackers. Learn about the concept of "unfluence" and the Office of No. Examine ideas from Bruce Schneier on randomness and access intent knowledge. Understand buffer overflow attacks, both technical and human. Discover the power of embedding stories and observation techniques. Study risk assessment methodologies, including Jack Jones' risk equation and risk management steps. Gain insights into pretext creation, rapport building, and effective communication strategies for security professionals. Analyze the impact of social media platforms like Twitter on influence and security. Conclude with a discussion on trading programs and their relevance to information security.
Syllabus
Intro
The Identity Paradox
Risk Management Social Engineering
How to Stop Hackers
Unfluence
Office of No
Schneier and Random
Access Intent Knowledge
Buffer Overflow
Human Buffer Overflow
Embedding Stories
Dale Carnegie
Johnny Long
Power of Observation
Risk
Jack Jones
Risk Equation
Risk Management Steps
Risk Framework
Loss Event Frequency
pretexting
how to build rapport
what I tell security folks
eye contact
Twitter
Trading Program
Related Courses
Cybersecurity in Healthcare (Hospitals & Care Centres)Erasmus University Rotterdam via Coursera Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn The Complete Social Engineering, Phishing, OSINT & Malware
Udemy A Complete Cyber Security Guide For Beginners 2024
Udemy Learn Social Engineering From Scratch 2024
Udemy