Time
1 hour 1 minute
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:01
Hi, everyone. Welcome back to the core. So, congratulations. You've made it through this many course on social engineering.
00:07
So what do we cover while in the introduction section, we covered a little bit about who I am As your instructor. We also cover how the course were structured as well as some of the objectives for the course. Now again, the objectives were to perform a phishing attack with the set tool or the social engineering tool kit, as well as reviewing some different social media profiles to see what kind of information we could get.
00:27
And we did all those inside a module to in the labs
00:30
and then a module three here. We're just wrapping up for this particular course
00:35
so startled to at the end there some courses you should be checking out if you're interested in social engineering, top of stuff. So fishing, for example, or, like us be drop attacks. Eso USB drop attack is of course, that's currently on the site. As of the filming of this video, the fishing courses coming soon to the site. So it's gonna be great
00:54
course on crafting the perfect phishing e mail.
00:56
We've also got a physical penetration testing course again, that's coming soon in the next couple of months here. And then, of course, if you want kind of a longer version of things, we've got my penetration testing an ethical hacking course. It's 40 up on the site.
01:07
So again, I want to thank you for watching this many course. Hopefully, you learned a lot. And again, don't forget to download the supplement of resource is section. As I mentioned before, I got some assessments in there for you, as well as all of the lab, step by step guides that you'll need for this course.

Social Engineering

This course covers basic information about social engineering. We will explore some fake social media profiles, craft our very own phishing email and malicious payload using the Social Engineering Toolkit (SET) in Kali Linux, and play the “victim” by opening the malicious file.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor