Ethical Hacking: Social Engineering

Ethical Hacking: Social Engineering

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch |1h 30m | 294 MB

Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated.

In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of “misuse of trust”—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks.

Topics include:

  • Visualizing the victim
  • Recognizing an attack
  • Using charm, power, and influence
  • Manipulating with social media
  • Preventing insider attacks
  • Stealing identities
  • Pen testing with social engineering
  • Taking countermeasures
Table of Contents

1 Defining social engineering
2 What you should know
3 Hacking ethically
4 Social engineering overview
5 Visualize the victim
6 Skills of a social engineer
7 Recognize an attack
8 Charm, power, and influence
9 Browsers for social engineering
10 Mobile-based attacks
11 Manipulate with social media
12 Disgruntled employees
13 Prevent insider attacks
14 Steal an identity
15 Email and websites
16 In person and on the phone
17 Social-Engineer Toolkit
18 SET in Kali Linux
19 Impacts and countermeasures
20 Impacts and countermeasures
21 Understanding spam
22 Preventing phishing attacks
23 Next steps