Ethical Hacking: Social Engineering

Pluralsight is not an official partner or accredited training center of EC-Council. This course will teach you about social engineering techniques attackers use to compromise systems, and the tools you can use to fight back.
Course info
Rating
(101)
Level
Beginner
Updated
February 4, 2016
Duration
4h 36m
Table of contents
Humans: The Soft Center Within the Hard Shell
A Walkthrough of a Social Engineering Attack
Reconnaissance and OSINT
Phishing Attacks
Identity Theft and Impersonation
Social Engineering Countermeasures
Description
Course info
Rating
(101)
Level
Beginner
Updated
February 4, 2016
Duration
4h 36m
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Security defenses within information systems focus primarily on technology controls, that is, security is implemented within physical appliances and software. These controls are frequently bypassed when the humans themselves are compromised by a social engineering attack. Social engineering involves compromising the individuals that use these systems. Attackers look to exploit weaknesses in human nature and coerce people into performing actions which give the attacker an advantage. In this course, we'll look at various different social engineering techniques that can be used to compromise systems. We'll also look at both computer-based and behavior-based tools to help defend against this risk. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

About the author
About the author

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.

More from the author
Modern Browser Security Reports
Beginner
57m 47s
3 Aug 2018
More courses by Troy Hunt