by Dean Pompilio

Social Engineering and Manipulation

 
0% Completed

In this online, self-paced Social Engineering and Manipulation training class, you will learn how some of the most elegant social engineering attacks take place. Learn to perform these scenarios and what is done during each step of the attack.

Time
4 hours
CEU/CPE
5 hours
Difficulty
Advanced
Share this course and earn Cybytes
FacebookTwitterGoogle+LinkedInEmail
Lessons
Description
Course Material
Certificate
 
Course Description
 
 

Social Engineering and Manipulation – Exploitation of the Human Element

Social engineering has been the cause of many of the most high profile cyber-attacks in recent years. The human element is too often the problem. In this online, self-paced Social Engineering and Manipulation training class, you will learn how some of the most elegant social engineering attacks take place. Learn to perform these scenarios and what is done during each step of the attack, from imitation through exploitation. This course is intended to help you better prepare your organization for defense of social engineering attacks, as well as how to ethically use these techniques for intelligence gathering. As a reminder, by taking this course, you agree to our terms of service.

Topics include: Intro to social engineering, exploitation lifecycle, digital information gathering, targeting, digital profile reduction, psychology of social engineering, elicitation, pretexting, cold calling, bypassing physical security, post exploitation, binary evasion and more.

Tools include: Kali Linux, Social Engineering Toolkit (SET), Google, Maltego, Scythe Framework, Recon-NG Framework, Creepy, Portable Virtual Box, Metasploit, Hyperion & Veil

Pre-requisites: This class is intended for cyber security professionals who have at least a baseline understanding of penetration testing and security policy principles. Approximately two years of experience in cyber security or Certified Ethical Hacker certification (or comparable cert) is highly recommended. If you do not meet these pre-requisites, it is recommended that you complete our Security+ and Ethical Hacker classes, before beginning.

Instructor: @polymath

500px-Closed_captioning_symbol.svgCEU / CPE: 5
Total Clock Hours: 3 hrs, 55 mins
Get a Certificate of Completion

Do you know someone who could benefit from this training class? Email them an invite and they can join you, and you earn cybytes

 
Course Badge
What is a Course Badge? Whenever you feel that you have mastered the content of a course, get yourself a nifty course badge to show off your profile.
Current Cybyte Count:
Course Badge: 15 Cybytes
Buy Badge
You need more Cybytes to earn this Course Badge
$ = 25 Cybytes

How do I earn my Certificate of Completion?

1. Complete Social Engineering and Manipulation on Cybrary

2. Earn 25 Cybytes by logging in, completing lessons and sharing courses and other content

3. Use your Cybytes to earn your Cybrary verified Certificate of Completion

Have questions? Visit our FAQ page to learn more.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

A “Noob’s” Guide to Ransomware
Views: 2485 / September 23, 2017
Dark Network Guide!
Views: 3546 / September 22, 2017
UNM4SK3D: SEC, APT33, and CCleaner
Views: 1725 / September 22, 2017
Penetration Testing Flash Applications
Views: 1794 / September 22, 2017
Skip to toolbar
[close]
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel