Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Ethical Hacking: Social Engineering [Updated: 2/22/2023]
#1
[Image: 8bafe1cabf40e8ce8332945cd44cfc7d.jpg]
Ethical Hacking: Social Engineering [Updated: 2/22/2023]
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 33m | 311 MB
Instructor: Lisa Bock

Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated.

In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks.

Note: This course maps to the Social Engineering competency of the Certified Ethical Hacker exam. You can review the exam objectives on the official

[To see links please register or login]

.

Learning objectives
  • Visualizing the victim
  • Recognizing an attack
  • Using charm, power, and influence
  • Manipulating with social media
  • Preventing insider attacks
  • Stealing identities
  • Pen testing with social engineering
  • Taking countermeasures

[To see links please register or login]


[Image: nV7QwxHM_o.jpg]

RapidGator

[To see links please register or login]

AlfaFile

[To see links please register or login]

TurboBit

[To see links please register or login]

[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
3 Guest(s)

Download Now   Download Now
Download Now   Download Now


Telegram