- [Voiceover] Ethical Hacking: Social Engineering is a basic course intended for IT security professionals, network administrators, students, teachers, or anyone with an interest in learning more about the social engineering phase of ethical hacking. You'll see why it is important to test social engineering in an organization as part of an overall security framework. Participants should have a basic understanding of security concepts, along with networking devices, such as switches, routers, firewalls, and have an interest in the subject.
To better prepare and understand tools such as the social engineering toolkit, participants should complete Introduction to Kali Linux with Malcolm Shore.
In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks.
Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Visualizing the victim
- Recognizing an attack
- Using charm, power, and influence
- Manipulating with social media
- Preventing insider attacks
- Stealing identities
- Pen testing with social engineering
- Taking countermeasures