Cyber Security Social Engineering - Hacking Human Firewalls
What you'll learn
- Understand what Cyber Security Social Engineering is, how it works and how you can protect yourself and your organization against it
- Learn how humans can easily be manipulated by a social engineer and how to identify and prevent such attacks
- Learn with a lot of practical examples how hackers and fraudsters try to hack and how to detect and protect against them
Requirements
- Online access during the course to access two practical attacking scenario videos (hosted on youtube) and walk through these attacks and learn how to protect against them
- Even non-IT people or absolute beginners are able to understand and learn how social engineering works and how to protect against it
Description
Hacking people is the most effective hacking technique, has the highest success rate and is very difficult to detect and prevent against. Learn how to hack the human firewall and how to protect yourself and your organization against so called social engineering attacks where people get manipulated to do things they usually would not do and companies get way too easy hacked with the support of their own employees without them noticing.
This course is for non-IT people/absolute beginners up to cyber security professionals that want to get into social engineering.
Your teacher has over 18 years experience including a bachelor and master in Cyber Security and was within various expert and head of positions in the security government area, large international consulting and the banking industry.
Course Overview (around 3.5 hours of valuable content)
What is social engineering and how does it work
The human risk factor
Sensitive vs. non-sensitive information
Hacking into your e-mails, icloud and fotos with very little effort and information
How to protect against password reset attacks
Why social engineering is so dangerous
Types of Social Engineering (Phishing, Smishing, Whaling, Vishing, Impersonation, Dumpster Diving, Baiting, Tailgating)
How to prevent all those Social Engineering attacks
Social Engineering Framework and how to plan and perform a social engineering attack (Open Source Intelligence, Built Your Story, Attack Plan, Attack, Documentation)
(BONUS) Real life Social Engineering Scenarios and how to protect against them
What you can expect from this course:
Sharing long time experience in this area
Lots of practical and real life examples instead of just theoretical frameworks
A trainer that is motivated helping you to easily understand social engineering and protect yourself and your organization against these attacks
The content is shared in easy to understand language so that everyone (even non-IT people or absolute beginners) can learn social engineering and how to protect themselves
You´ll be provided the possibility to join a Cyber Security experts chat group and contact the instructor for questions
IMPORTANT: You will need to watch within lecture four a video on youtube as it shows you a practical social engineering attack that we will analyze and discuss in our course. This video cant be incorporated into the udemy plattform for legal / copyright reasons. Therefore you will need an active internet connection for this small part. The video only lasts 2 minutes.
Who this course is for:
- Beginners
- Non-IT people
- Upcomming Cyber Professionals
- Social Engineering enthusiasts
- Future Social Engineers
- All Levels that want to get into Social Engineering
Instructor
My motivation is to help everyone (specifically people without any IT or cyber security knowledge) to get "cyber fit" and enable you to secure yourself and your organization with as little effort as possible to uplift your cyber security maturity as much as possible. Everyone should be able to understand cyber security threats to detect and prevent cyber attacks.
About me:
- 18 years experience in Cyber Security
- Bachelor and Master of Science in IT-Security
- Cyber Security Incident and Response
- Cyber Security Malware Analyst
- Consultant for IT-Security
- Trainer for IT-Security
- Manager IT-Audit
- Head of IT-Security
- Head of Identity and Access Management
- Head of Cyber Security
- Certifications within IT-Security, Data Protection, IT-Audit
- Keynote speaker on conferences about Cyber Security
Roles above within the government sector, international consulting and the banking industry