Introduction:
Social engineering s the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Social engineering attacks happen in one or more steps. Social engineering s the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Social engineering attacks happen in one or more steps.
Objectives:
§ Understanding basic knowledge of Social engineering.
§ understanding why social engineering is an important consideration for cybersecurity.
§ The course provides tools and techniques for testers to identify flaws in their environments that are vulnerable to social engineering attacks
Course Outlines:
§ introduction
§ How Does Social Engineering Work?
§ Example of Social Engineering Attacks
§ How to Spot Social Engineering Attacks
§ How to Prevent Social Engineering Attacks
§ Most Common Types of Social Engineering Attacks
§ Advantages
§ Disadvantages
Who should attend?
§ Students
§ Cybersecurity professionals
§ IT professionals
Learning Outcomes:
§ Understanding basic knowledge of Social engineering.
§ understanding why social engineering is an important consideration for cybersecurity.
§ The course provides tools and techniques for testers to identify flaws in their environments that are vulnerable to social engineering attacks