Ethical Hacking: Social Engineering

Pluralsight
Course Summary
Security controls traditionally focus on securing the information systems people use. However, people themselves are frequently the weak link; social engineering exploits human behaviors to give the attacker the upper hand in ultimately achieving malicious objectives. This course will teach you about social engineering techniques attackers use to compromise systems, and the tools you can use to fight back. This course is part of the Ethical Hacking Series: http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Description
Security defenses within information systems focus primarily on technology controls, that is, security is implemented within physical appliances and software. These controls are frequently bypassed when the humans themselves are compromised by a social engineering attack. Social engineering involves compromising the individuals that use these systems. Attackers look to exploit weaknesses in human nature and coerce people into performing actions which give the attacker an advantage. In this course, we'll look at various different social engineering techniques that can be used to compromise systems. We'll also look at both computer-based and behavior-based tools to help defend against this risk. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Syllabus
Humans: The Soft Center Within the Hard Shell- 29m 14s
—Overview 2m 46s
—Social Engineering Through the Ages 2m 8s
—The Soft Center That Social Engineering Exploits 4m 49s
—Human Weaknesses That Enable Social Engineering 10m 37s
—Computer-based Versus Human-based Social Engineering 3m 30s
—Social Engineering at Home and in Popular Culture 3m 39s
—Summary 1m 41sA Walkthrough of a Social Engineering Attack- 50m 28s
—Overview 1m 35s
—Case Study: Cold Call Virus Scams 3m 47s
—Establishing Authority and Creating Fear 2m 58s
—Executing the Social Engineering Attack 6m 7s
—Demonstrating Authenticity 10m 43s
—Creating a Debt 12m 17s
—Monetizing the Scam 10m 20s
—Summary 2m 37sReconnaissance and OSINT- 37m 41sPhishing Attacks- 58m 46sIdentity Theft and Impersonation- 45m 29sSocial Engineering Countermeasures- 54m 47s