Course Fundamentals of social engineering for IT

CURS-156

Protect your company from computer attacks and understand the basic foundations of Social Engineering. Learn how to protect your company's relevant information



Course Fundamentals of social engineering for IT


This course will introduce you to the basics of social engineering, protecting your company from computer attacks and reducing the chances of success of those who attack us using these means.

Introduction to social engineering

In this chapter we will see what social engineering is, fundamentals, who applies it, in what scenarios we can be victims of its techniques.

    What is social engineering 05:07
    Environments of use of social engineering 04:34
    Why should social engineering worry us 05:02
    Who are the social engineers and how they prepare 05:17
    Personality classification according to social engineering 06:21
    Real examples of social engineering attacks 05:11

The foundations of social engineering

In this chapter we will develop the psychological, cultural and social foundations of social engineering and why it is so effective in obtaining information or manipulating people's intentions.

    Fundamentals of social engineering 05:10
    Fear and social engineering 04:52
    Empathy and social engineering 05:18
    The seven deadly sins and social engineering 06:01
    The excuse inside an attack via social engineering 05:23
    Neurolinguistic programming as mind control tricks 06:32
    Blackmail within social engineering 05:11

Gathering information, goal of social engineering

    OSINT or Open Source Intelligence 07:53
    Your company's own website as a source of leaks 05:23
    Social networks as a source of information 04:57
    Family, fools and friends in social engineering 04:41
    Trashing in social engineering 04:40
    Doxing or information search in social engineering 04:46
    Metadata in files as an information source 04:58
    Metadata in the photographs as a source of information 05:26
    Password recovery techniques 04:31

Social engineering tools

In this chapter we will see the existing tools to automate the work of the attackers.

    FOCA, the application to extract metadata from files 04:20
    Maltego, the application to correlate data 05:28
    Google Hacking, or when the search engine talks too 06:10
    theHarvester, the software for data collection 05:11
    SET - Social Engineering Toolkit 05:16

Attack techniques of social engineering

In this chapter we will analyze the causes that make social engineering techniques effective, and we will explain how the best known and most efficient techniques are developed and applied.

    Classification of social engineering attacks 05:32
    Phishing or phishing 05:39
    Scareware, the fear technique 05:19
    Errata domains that deceive the user 05:03
    The zombie or the infection of a digital device 05:33
    The forgotten USB as a hook technique 05:22
    Emulation of technical problems as method of attack 04:55
    Fraud to the CEO from outside the organization 05:25
    The closed mouths do not sink boats 04:01
    Piggyback or access for overconfidence 05:30

Common sense as the first line of defense

Common sense and experience are the only barriers that we can interpose between the attacker and his objectives.

    The least common of the senses, although it may seem like 05:28
    What nobody is going to ask you, or better, I should ask you 05:47
    The scammer's strategy to extract information 04:31
    Nothing so urgent as to do things without thinking 05:01

Prevention and response to social engineering

In this chapter we will see how to be prepared, trained and tested against social engineering, so that we can detect attacks or minimize their damage if they were successful.

    Education against social engineering 04:45
    Information before the fashions of social engineering 05:15
    Security check against social engineering attacks 05:39
    System access registry to discover violations 05:17
    Distribution and compartmentalization of information 05:17
    Contingency plan before a clear attack 04:56
    Paranoia and final conclusions on social engineering 03:07

Technical data:

    Format: .MP4
    Resolution: 1280x720p
    Size: 512 MB
    Spanish Language
    Formators: Sergio R.-Solís
    Content: 48 Videos
    Duration: 4:11 hours
    Software: Unity, Unity 5.3
    Base Files: SI Includes
    Date of publication: Sep 12, 2016
    Company: Video2Brain

Ver Intro


Totally free of viruses and malicious software, so do not wait any longer to download it now.

Do not forget to give us an opinion about the program, to improve the content.

Download area



Contraseña/Password: www.intarcesoft.com.ve

Follow us on our social networks


NOTE: Do not forget to follow us on our facebook and twitter social networks so that you become part of our community and receive the notification every time we post something new, so you will not miss anything.

OS Windows XP o superior
RAM 256 MB
License Freeware
Language Only Spanish
File Size 512 MB
Developer Video2Brain
Grade 
04/21/2017

Excelente

Gran curso

Write your review!

Write a review

Course Fundamentals of social engineering for IT

Course Fundamentals of social engineering for IT

Protect your company from computer attacks and understand the basic foundations of Social Engineering. Learn how to protect your company's relevant information



Ask a question

NO registration required!

If the question you have has not yet been answered here, use the form below to ask something about this addon.

(optional)
*(Required to be notified when an answer is available)

If the download link redirects to another product that is not described in the article or is broken, report it using our Reporting Form

RelatedProducts