Complete Ethical Hacking Series: Social Engineering
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Complete Ethical Hacking Series: Social Engineering to your Wishlist.

Add to Wishlist

Complete Ethical Hacking Series: Social Engineering

Complete Ethical Hacking Series (CEHv9): Social Engineering
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5 students enrolled
Created by Chad Russell
Last updated 7/2017
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Pass the components of the Certified Ethical Hacker Exam v9 pertaining to Social Engineering.
  • Students will be able to use Social Engineering tools and techniques demonstrated throughout the course.
View Curriculum
Requirements
  • Students should have a working understanding of TCP/IP and networking concepts.
Description

Complete Ethical Hacking Series:  Social Engineering

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   Each chapter closes with exercises putting your new learned skills into practical use immediately.   You will start by understand network anonymity by using tools such as Rubber Ducky, Beef and the Social Engineering Toolkit.   

What are the pre-requisites for this course?

  1. Students should have a working understanding of TCP/IP and networking concepts. 

What will you be able to do after taking this course?

  • Social Engineering -   Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.
  • Paypal Phishing - Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details and money, often for malicious reasons, by disguising as a trustworthy entity in an electronic communications.
  • Rubber Ducky -   The USB Rubber Ducky is a keystroke injection tool disguised as a generic flash drive. Computers recognize it as a regular keyboard and accept pre-programmed keystroke payloads at over 1000 words per minute.  Payloads are crafted using a simple scripting language and can be used to drop reverse shells, inject binaries, brute force pin codes, and many other automated functions for the penetration tester and systems administrator.
  • Beef -  What is Beef? Beef is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile clients, Beef allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. Beef will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.
  • Social Engineering Toolkit - The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element.  The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.


  • Cyber Attacks - In this course you will learn about numerous types of cyber attacks and how to execute them.
  • HR and Personnel Security - As a cyber security practitioner you need to know how to protect corporate personnel.   Learn social engineering defense techniques in this portion of the course. 
Who is the target audience?
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand social engineering by using tools such as Rubber Ducky, Beef and the Social Engineering Toolkit.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Social Engineering
6 Lectures 46:46


Beef Demo
03:14

Rubber Ducky
03:34

Cyber attacks
17:16

HR and Personnel Security
10:50
About the Instructor
Chad Russell
3.6 Average rating
1,050 Reviews
16,815 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!