Complete Guide to Social Engineering Attacks
Understand the Social Engineering Attacks processes and the techniques of protection from these attacks.
Description
People are the weakest link of the security because the technological security methods are getting stronger. Social engineering is the term used to refer the art of manipulation of the users into revealing sensitive information that can be used to gain access to their computer system.
In this course, you will learn various malicious methods attackers use to perform Social Engineering Attacks. You will get to know how these attacks are conducted; common attack techniques- use of tools- information gathering- utilizing acquired information; and their countermeasures.
This course will outline several social engineering threats and explains how you can defend yourself against them.
What You Will Learn!
- Different Types of Social Engineering Attacks
- Demo on performing Social Engineering Attacks: Phishing page via SET tool kit/manually/web application
- Case studies on CEO fraud, Vishing, RBI Scam
- Countermeasures of Social Engineering Attacks
- Social Engineering Attacks Mitigation
Who Should Attend!
- Anyone interested to learn Social Engineering tools and techniques
- Anyone who want to learn how to secure their systems from Social Engineering Attacks