Complete Guide to Social Engineering Attacks
What you'll learn
- Different Types of Social Engineering Attacks
- Demo on performing Social Engineering Attacks: Phishing page via SET tool kit/manually/web application
- Case studies on CEO fraud, Vishing, RBI Scam
- Countermeasures of Social Engineering Attacks
- Social Engineering Attacks Mitigation
Requirements
- A PC/Laptop with a stable internet connection
- Keen interest in learning Ethical Hacking concepts
Description
People are the weakest link of the security because the technological security methods are getting stronger. Social engineering is the term used to refer the art of manipulation of the users into revealing sensitive information that can be used to gain access to their computer system.
In this course, you will learn various malicious methods attackers use to perform Social Engineering Attacks. You will get to know how these attacks are conducted; common attack techniques- use of tools- information gathering- utilizing acquired information; and their countermeasures.
This course will outline several social engineering threats and explains how you can defend yourself against them.
Who this course is for:
- Anyone interested to learn Social Engineering tools and techniques
- Anyone who want to learn how to secure their systems from Social Engineering Attacks
Course content
- Preview00:59
- Preview01:19
- Preview01:55
Instructor
Paratosh Bansal has an excellent grip on VAPT of Web apps, Mobile apps, Servers, IoT enabled devices, AI/ML-based applications and Network Infrastructure. He has wide domain experience of working with companies in healthcare, telecommunications, FinTech, E-Commerce, Smart Devices, and IT Infrastructure Companies. He has helped companies like Airtel, PVR Cinemas, Max Life Insurance, Citrus Payment Gateway with the security of their IT assets. He also follows his passion to train the youth and has trained over 10,000+ students and working professionals as well.