Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
2 hours 41 minutes
Hey, everyone, welcome to the social engineering course. My name is Ken Underhill over your instructor for this course. In this video, we're gonna talk about any prerequisites you might need for this course will also give overview other course So basically the core structure and I'll introduce myself as your instructor.
So there really aren't any prerequisites for this particular course. However, it's a pretty good idea. Have some general I. T. Or cybersecurity knowledge, just a little bit of familiarity with certain concepts that's gonna help you with this particular course.
So who am I? What my name is Ken. Underlines I mentioned on the Master instructor is Sai Buri. I also hold a graduate degree in cybersecurity and information assurance from Western Governors University. I hold a couple of industry certifications, the certified ethical hacker and the computer hacking forensic investigator certifications from EEC Council.
Last year I was awarded the S E Media Reboot Leadership Award for outstanding educator
and in my spare time, which is pretty rare. But when my spare time, I practice tactical ninja etc. So that's why you see a little ninja on the photo there. And I'm very active on Lincoln's you can always find me over on there.
So this course is really intended for individuals that are either junior pen testers or looking to go into pen testing. However, anyone can take this course and find a beneficial
We're gonna start out in the introduction module. So after this video, we're gonna talk a little bit about what social engineering actually is. And then we're gonna jump right in Module two and a couple of labs to give you some hands on experience with a tool called the Social Engineering Tool Kit or commonly called Set. And then we'll just wrap things up in module three.
So this course is gonna have several materials available in the resource is section, so you'll see a syllabus study guide a glossary. You'll see some step by step lab guides for the labs that I mentioned as well as in the labs of cells. There's actually instructions, and then they'll be an assessment to wrap up this particular course.
So in this video, we just talked about the prerequisites again is a good idea. Have some general I. T. Or cybersecurity knowledge. It's gonna really help you in this particular course, especially with some of the terminology we go over.
We also talked about the core structure. So again, after the first couple of lectures here in module to we jump right into hands on labs. And then we talked about my background is your instructor.
So, as I mentioned already in the next video, we're gonna talk about a brief introduction to social engineering.