The Art of Hacking Humans: Intro to Social Engineering
- Basic knowledge of the Internet and networks.
We are constantly exposed to various threats regarding our information in this day-and-age. We are becoming more and more connected to networks like the Internet with a lot of our daily activities - both and work and play - revolve around a digital device or platform or the other; this increases our vulnerability to compromise by malicious attackers. A very common method used by malicious attackers to compromise information and information systems is social engineering. This takes advantage of human weakness to initiate or execute an attack or breach.
This course seeks to give a basic overview of social engineering to the beginner. It introduces the concept of social engineering and some common social engineering techniques, and how these techniques can be used to manipulate victims resulting in compromise.
Note: Although email addresses are generally redacted in sample social engineering messages shown in the course, bear in mind that any email address and names of apparent senders of such messages contained herein might be hacked. That is to say the names and email addresses that appear might belong to innocent people, but might have been hijacked.
Who this course is for:
- Employers and employees who need to understand why their information assets need to be protected.
- Beginner students of information security
- Anybody who wants to learn how to be safe in the information age.
- 16:38What is Cyber Security, what is Social Engineering?
- 5 questionsLecture 2 Quiz
- 11:15Why Social Engineering?
- 5 questionsLecture 3 Quiz
- 14:09Brief Historical Overview
- 7 questionsLecture 4 Quiz
- 00:50Common Social Engineering Techniques
Certified Information Systems Auditor (CISA) with an M.Sc. in Computer
Security, and a passion for Information Security, Assurance and Control.
Currently Marketing Executive of GGL Risk and Strategic Consulting - a
training and consulting firm that is into organizing trainings and
seminars pertaining to information and physical management, security,
assurance and control; finance; fraud prevention and detection; and
Is an author for eForensics Magazine and
has written articles for the magazine as well as ISACA Journal; and had
written a chapter on E-discovery and forensic readiness in IGI Global's
Handbook of research on Digital Crime, Cyberspace security, and
Information Assurance. Had also delivered a workshop on eDiscovery for
eForensics Magazine, as well as a video on the IGI Global book chapter.