Cyber Security - OSINT and Social Engineering Course
What you'll learn
- The Students will understand the basic concepts of OSINT and Social Engineering.
- They will be able to use tools specified in the course for OSINT and Social Engineering
- Will be able to perform extensive information gathering and also be able to perform Social Engineering
- A Computer or a Smart Phone connected to the internet.
- Interest to learn the fundamentals of OSINT and Social Engineering
- Basic Understanding of the Computers and the Internet.
Learn and understand the fundamental concepts of the Open Source Intelligence and Social Engineering and how they could be applied in the real world scenario.
Social Engineering is a method that is hardly understood well by people, as it is the best way to get access into any systems when there is no possible way in terms of attacking the machines. And this course mainly aims at providing the knowledge on easily available tools to initially gather all the intelligence needed (via the Open Source Intelligence techniques), and then perform the Social Engineering Attacks based on all the information that is obtained. The tools used in this course are the standard tools used in the Information Security Industry and is explained in the most easy and understandable way.
Who this course is for:
- Cyber Security Professionals
- Anyone who has interest in getting into the world of Cyber Security
We are a new age Cyber Security Firm. We as an organization aims towards providing Information Security Services and Process Improving Consulting services. Members of FWT have attained excellence in providing end-to-end consulting services across sectors including but not limited to Banks, Airports, Finance, IT, Retails etc. With the core team comprising of domain experts with over a decade of experience, we help organizations to reduce risks and enhance their competitive advantage over others. We provide all cyber security solutions by ways of Penetration Testing and Quality Analysis of Web Based Applications and Web Infrastructures coupled with actionable reporting and patching the reported vulnerabilities. We provide constant scanning, surveillance and guarding services for web based resources. we also provide an array of sophisticated and customized web security training courses.