Overview
This course covers the learning outcomes and goals of understanding social engineering techniques and how to protect against them. It teaches skills such as recognizing different manipulation techniques, guarding against information gathering, and implementing personal and corporate mitigation techniques. The teaching method involves exploring methodologies, statistics, and real-life examples. The intended audience for this course includes individuals interested in cybersecurity, risk management, and protecting organizational assets from social engineering attacks.
Syllabus
Intro
3 Methodologies
Statistics : Impersonation
Types of Social Engineer
Why Social Engineering?
Common Attacks
Kevin Mitnick
Frank Abagnale
Charles Ponzi
Social Engineering Techniques
Information Gathering
Questioning Techniques
Pretexting vs Elicitation
Manipulation - Fear
Manipulation - Guilt
Manipulation - Foot in the Door
Personal Mitigation Techniques
Corporate Mitigation Techniques
Taught by
NDC Conferences