Ethical Hacking: Social Engineering
Pluralsight is not an official partner or accredited training center of EC-Council. This course will teach you about social engineering techniques attackers use to compromise systems, and the tools you can use to fight back.
What you'll learn
Pluralsight is not an official partner or accredited training center of EC-Council. Security defenses within information systems focus primarily on technology controls, that is, security is implemented within physical appliances and software. These controls are frequently bypassed when the humans themselves are compromised by a social engineering attack. Social engineering involves compromising the individuals that use these systems. Attackers look to exploit weaknesses in human nature and coerce people into performing actions which give the attacker an advantage. In this course, we'll look at various different social engineering techniques that can be used to compromise systems. We'll also look at both computer-based and behavior-based tools to help defend against this risk. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Table of contents
- Overview 3m
- Teach a Man to Phish and He'll Eat for a Lifetime 8m
- Call Signs of a Phishing Email 7m
- Call Signs of a Phishing Page 5m
- Understanding Spearphishing 3m
- Enumeration as a Verification Vector 3m
- Filter Evasion and Concealment Techniques 8m
- Identifying Attacks with PhishTank 2m
- Phishing with BeEF 9m
- Mounting Your Own Ethical Phishing Attack with Phish5 8m
- Summary 2m
- Overview 2m
- Defenses in the Browser and Email Clients 7m
- Record Destruction 8m
- Physical Security 5m
- Separation of Duties and the Principle of Least Privilege 9m
- Multi Step and Side Channel Identity Verification 10m
- Logging, Auditing, and Monitoring 4m
- Identity Monitoring 4m
- Conditioning the Humans 4m
- Summary 3m