Font size:

Social engineering has been considered the number one cyber security threat by many industry resources. This course provides the skills to defend against social engineering attacks that threaten organizational security. Through hands-on exercises, you learn the motivations and methods used by social engineers to better protect your organization and prevent data breaches.


Introduction to Social Engineering

Evaluating the organizational risks

  • Assessing social engineering threats
  • Analyzing classic case studies

Thinking like a social engineer

  • Considering attack frameworks
  • Reviewing the methods of manipulation
  • Examining legal issues and social concerns

Gathering Information and Intelligence

Identifying information sources

  • Gathering information passively and actively
  • Leveraging social media
  • Exploiting Google hacking

Collecting target information

  • Ripping information from sites with Maltego
  • Dumpster diving for secrets and intelligence
  • Profiling users for passwords

Minimizing information leaks

  • Securing information leaks
  • Implementing secure disposal policies
  • Pinpointing reconnaissance probes

Identifying Communication Models

Profiling an information architecture

  • Implementing the Berlo communication model
  • Source
  • Message
  • Channel
  • Receiver
  • Determining communication weaknesses

Addressing communication flaws

  • Verifying the source
  • Securing the information channel

Assessing Elicitation Methods

Drawing out information

  • Soliciting information
  • Interview techniques
  • Identifying elicitation tactics and goals

Mitigating information leaks

  • Maintaining situational awareness
  • Implementing scripted responses

Gaining Physical Access

Circumventing physical security

  • Identifying weak types of locks
  • Bypassing electronic access controls

Securing the environment

  • Implementing high security locks
  • Preventing lock bumping

Impersonating Authorized Personnel

Gaining access with a disguise

  • Identifying spoofing techniques
  • Discovering change blindness deception
  • Assessing Internet impersonation techniques

Defending against impersonation and forgery

  • Implementing techniques to verify identity
  • Avoiding skimmers and hidden technology threats

Employing Psychology for Persuasion

Examining human weaknesses

  • Leveraging Cialdini's motivation factors
  • Identifying mindlessness dangers
  • Exploring commitment and consistency vulnerability

Compelling behavior

  • Exploiting social proofing
  • Taking advantage of implied authority
  • Demanding action with "quid pro quo"

Bolstering resistance to persuasion

  • Adhering to policy and rules
  • Recognizing risky situations
  • Learning to interpret and then recognize

Implementing Management Countermeasures

Assessing social engineering vulnerabilities

  • Conducting a penetration test
  • Creating a scope of work
  • Mitigating legal issues and embarrassment

Creating comprehensive policies

  • Establishing verification policies
  • Regulating the use of social networks
  • Delivering effective security awareness training
Find a class and register in three easy steps:
  • 1. Select Location:
  • 2. Select Date Range:
    to
  • 3. Select Class Type:
    • All Types
    • C Classroom
    • V Virtual Live
    • Cv In-Class Virtual
    • O Online
Virtual Live1/17/2018 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>3 days2650.001805601
MD LAUREL1/17/2018 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>3 days2650.001814903
Virtual Live4/18/2018 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>3 days2650.001805602
MD Rockville4/18/2018 9:00:00 AM<span class="course-type type-c" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'ILT')" onmouseout="clearHoverInfo()">C</span>3 days2650.001803720
VA SAINT STEPHENS CHURCH4/18/2018 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>3 days2650.001814905
Virtual Live7/18/2018 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>3 days2650.001805605
NJ Princeton7/18/2018 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>3 days2650.001814921
seek-warrow-w
  • 1
arrow-eseek-eitems per page1 - 7 of 7 items