- [Voiceover] Thank you for watching Ethical Hacking: Social Engineering. I've covered an overview of social engineering. I've reviewed concepts such as how the attackers visualize the victim, what skills are necessary to become a social engineer, and how to recognize an attack. I've discussed some methods including using charm, power, and influence, how hackers use browsers, mobile-based, and social media to launch an attack. I cautioned on how social engineers exploit our trusting nature.
In addition, I cautioned as to why you should be wary of the disgruntled employee, insider attacks, and identity theft. I covered the importance of conducting penetration testing for social engineering using email, websites, in person, and on the phone, and an overview of the social engineering toolkit. If you're interested in learning more, please check out the other courses in our library, new courses are added every day.
If you're interested in learning about packet analysis, check out my Wireshark course. If you're interested in learning about encryption, check out Essentials of Cryptography. In addition, you might want to check out the Foundations of IT Security series. If you're ready to continue your journey as an ethical hacker, be sure to watch the other courses in the series. Keep learning, and I hope to see you again soon.
In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks.
Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Visualizing the victim
- Recognizing an attack
- Using charm, power, and influence
- Manipulating with social media
- Preventing insider attacks
- Stealing identities
- Pen testing with social engineering
- Taking countermeasures