Dec

14

2021

Cyber Security Social Engineering - Hacking Human Firewalls

Laser 14 Dec 2021 14:50 LEARNING » e-learning - Tutorial

Cyber Security Social Engineering - Hacking Human Firewalls
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 3.96 GB | Duration: 3h 39m

Learn from a Cyber Security leader with more than 18 years experience everything about Social Eeering
What you'll learn
Understand what Cyber Security Social Eeering is, how it works and how you can protect yourself and your organization against it
Learn how humans can easily be manipulated by a social eeer and how to identify and prevent such attacks
Learn with a lot of practical examples how hackers and fraudsters try to hack and how to detect and protect against them
Requirements
Online access during the course to access two practical attacking scenario videos (hosted on youtube) and walk through these attacks and learn how to protect against them
Even non-IT people or absolute bners are able to understand and learn how social eeering works and how to protect against it
Description
Hacking people is the most effective hacking technique, has the highest success rate and is very difficult to detect and prevent against.

Learn how to hack the human firewall and how to protect yourself and your organization against so called social eeering attacks where people get manipulated to do things they usually would not do and companies get way too easy hacked with the support of their own employees without them noticing.
This course is for non-IT people/absolute bners up to cyber security professionals that want to get into social eeering.
Your teacher has over 18 years experience including a bachelor and master in Cyber Security and was within various expert and head of positions in the security government area, large international consulting and the banking industry.
Course Overview (around 3.5 hours of valuable content)
What is social eeering and how does it work
The human risk factor
Sensitive vs. non-sensitive information
Hacking into your e-mails, icloud and fotos with very little effort and information
How to protect against password reset attacks
Why social eeering is so dangerous
Types of Social Eeering (Phishing, Smishing, Whaling, Vishing, Impersonation, Dumpster Diving, Baiting, Tailgating)
How to prevent all those Social Eeering attacks
Social Eeering Framework and how to plan and perform a social eeering attack (Open Source Intelligence, Built Your Story, Attack Plan, Attack, Documentation)
(BONUS) Real life Social Eeering Scenarios and how to protect against them
What you can expect from this course:
Sharing long experience in this area
Lots of practical and real life examples instead of just theoretical frameworks
A trainer that is motivated helping you to easily understand social eeering and protect yourself and your organization against these attacks
The content is shared in easy to understand language so that everyone (even non-IT people or absolute bners) can learn social eeering and how to protect themselves
You´ll be provided the possibility to join a Cyber Security experts chat group and contact the instructor for questions
IMPORTANT: You will need to watch within lecture four a video on youtube as it shows you a practical social eeering attack that we will analyze and discuss in our course. This video cant be incorporated into the udemy plattform for legal / copyright reasons. Therefore you will need an active internet connection for this small part. The video only lasts 2 minutes.
Who this course is for:
Bners
Non-IT people
Upcomming Cyber Professionals
Social Eeering enthusiasts
Future Social Eeers
All Levels that want to get into Social Eeering




DOWNLOAD
uploadgig.com



rapidgator.net


nitro.download

High Speed Download

Add Comment

  • People and smileys emojis
    Animals and nature emojis
    Food and drinks emojis
    Activities emojis
    Travelling and places emojis
    Objects emojis
    Symbols emojis
    Flags emojis