Protect your company from computer attacks and understand the basic foundations of Social Engineering. Learn how to protect your company's relevant information
This product is no longer in stock
This course will introduce you to the basics of social engineering, protecting your company from computer attacks and reducing the chances of success of those who attack us using these means.
In this chapter we will see what social engineering is, fundamentals, who applies it, in what scenarios we can be victims of its techniques.
What is social engineering 05:07
Environments of use of social engineering 04:34
Why should social engineering worry us 05:02
Who are the social engineers and how they prepare 05:17
Personality classification according to social engineering 06:21
Real examples of social engineering attacks 05:11
In this chapter we will develop the psychological, cultural and social foundations of social engineering and why it is so effective in obtaining information or manipulating people's intentions.
Fundamentals of social engineering 05:10
Fear and social engineering 04:52
Empathy and social engineering 05:18
The seven deadly sins and social engineering 06:01
The excuse inside an attack via social engineering 05:23
Neurolinguistic programming as mind control tricks 06:32
Blackmail within social engineering 05:11
OSINT or Open Source Intelligence 07:53
Your company's own website as a source of leaks 05:23
Social networks as a source of information 04:57
Family, fools and friends in social engineering 04:41
Trashing in social engineering 04:40
Doxing or information search in social engineering 04:46
Metadata in files as an information source 04:58
Metadata in the photographs as a source of information 05:26
Password recovery techniques 04:31
In this chapter we will see the existing tools to automate the work of the attackers.
FOCA, the application to extract metadata from files 04:20
Maltego, the application to correlate data 05:28
Google Hacking, or when the search engine talks too 06:10
theHarvester, the software for data collection 05:11
SET - Social Engineering Toolkit 05:16
In this chapter we will analyze the causes that make social engineering techniques effective, and we will explain how the best known and most efficient techniques are developed and applied.
Classification of social engineering attacks 05:32
Phishing or phishing 05:39
Scareware, the fear technique 05:19
Errata domains that deceive the user 05:03
The zombie or the infection of a digital device 05:33
The forgotten USB as a hook technique 05:22
Emulation of technical problems as method of attack 04:55
Fraud to the CEO from outside the organization 05:25
The closed mouths do not sink boats 04:01
Piggyback or access for overconfidence 05:30
Common sense and experience are the only barriers that we can interpose between the attacker and his objectives.
The least common of the senses, although it may seem like 05:28
What nobody is going to ask you, or better, I should ask you 05:47
The scammer's strategy to extract information 04:31
Nothing so urgent as to do things without thinking 05:01
In this chapter we will see how to be prepared, trained and tested against social engineering, so that we can detect attacks or minimize their damage if they were successful.
Education against social engineering 04:45
Information before the fashions of social engineering 05:15
Security check against social engineering attacks 05:39
System access registry to discover violations 05:17
Distribution and compartmentalization of information 05:17
Contingency plan before a clear attack 04:56
Paranoia and final conclusions on social engineering 03:07
Size: 512 MB
Formators: Sergio R.-Solís
Content: 48 Videos
Duration: 4:11 hours
Software: Unity, Unity 5.3
Base Files: SI Includes
Date of publication: Sep 12, 2016
Totally free of viruses and malicious software, so do not wait any longer to download it now.
Do not forget to give us an opinion about the program, to improve the content.
NOTE: Do not forget to follow us on our facebook and twitter social networks so that you become part of our community and receive the notification every time we post something new, so you will not miss anything.
|OS||Windows XP o superior|
|File Size||512 MB|
NO registration required!
If the question you have has not yet been answered here, use the form below to ask something about this addon.