How to Outwit a Social Engineer
What you'll learn
- Social Engineering techniques and tricks
- Humint (Human Intelligence ) techniques
- Spotting scammers, spies and other dangerous persons
- Clandestine elicitation techniques
- Unlocking people's secrets covertly
- Detecting sophisticated Social Engineering and phishing attacks at a glance
- How the human brain can be hacked and how to protect it.
- How to protect your assets and even your brain from human hacking
Requirements
- Analytical and flexible thinking
- It's not a course on technical or software stuff. It's rather about what makes people tick
- Passion for psychology will be a benefit but not a must
Description
You’re about starting the course that will change your life. Here is why.
If you work in the security sector, be it cybersecurity, business intelligence, law enforcement, private investigations, etc., the benefits are obvious. Your professional skills will skyrocket, so it pushes your career and gives you a bunch of advantages over your competitors. And reward you with that amazing feeling of satisfaction that comes only when you know that your job performance is outstanding.
But what if you’re not a kind of a security specialist? Fortunately, you can gain even more. Would not it be dreamy if you’ll be able to detect at a glance when people try to conceal something important from you? What about knowing what your competitors are up to? What about easy spotting scammers, criminals and other bad guys hunting for you? What about your friends and loved ones who fear owning up to something? And would you like to know how others covertly elicit your secrets from you —and finally stop this dangerous process?
You’ll be able to do everything from the list after taking this course. In fact, you’ll be able to do much, much more.
Social Engineering nowadays is considered a kind of communicational black magic that forces people to execute any command of a Social Engineer. And when we say SE, what it comes to mind first is cybercriminals. Yes, social engineering is a part of their dark arsenal but not limited by it. For example, law enforcement uses social Engineering to catch the bad guys too. In reality, Social Engineering is an essential part of many walks of life, including politics, intelligence and law enforcement, sales and marketing and even personal relationship.
In short, social engineering is a hidden influence.
In this course, I’ll teach you a special part of social engineering – unlocking people's secrets. Making people voluntary share their secrets, to be precise. And this is the only way to learn how to keep your secrets safe.
This course is unique. Because unlike many courses on Social Engineering existing on the market, it’s not about technical tools and software. It’s about the essence of Social Engineering: people’s psychology. It’s not about the vulnerabilities of a computer. It’s about vulnerabilities of the human brain -- how it can be attacked and how to protect it.
This course is unique for many other reasons. Firstly, it’s based on my 20 years in psychological security and 7 years in cybersecurity areas experience. In this way, I was privileged to work with the brilliant intelligence and law enforcement pros, who had been promoted from lieutenants to generals. I’ve learned from them plenty of exclusive useful techniques and tricks that help me in work and life. I share some of these techniques in this course.
More of that, the course is also based on tens of authoritative phycology books and science research. So you’ll not only learn the techniques but deeply understand the patterns behind them and why they work. It gives you a fantastic possibility to create your own techniques precisely suitable for your special circumstances. After learning these principles, spotting scam or phishing of different kinds will become a walk in the park for you let alone revealing secrets.
And here is your way to the top.
In the first section, you'll learn what is Social Engineering and why it's so effective. You'll discover the main principle that makes Social Engineering almost unbeatable for most people. Then you'll find out what HUMINT is and what benefits you'll get from it. Then you'll see why revealing people's secrets may be extremely hard and how to bypass these hinders.
Then, in Section 2, we'll deep into tactical Social Engineering. You'll find out about various natural vulnerabilities of the human brain and how they can be exploited in seconds. You'll discover why so many people, including most intellectual ones, fall prey to phishing attacks and give away their bank credentials or infect their computers with their own hands. You'll know sophisticated techniques used by cybercriminals to force their victims to give away their important secrets like passwords and private data. You'll learn how your basic instincts and emotions can be used to play against you and how easily they are triggered.
In Section 3 you'll learn the magic of the effective HUMINT elicitation techniques used by law intelligence agencies, law enforcement, secret agents and other pros of such kind. You'll learn to become a person to whom people want to confide their secrets. In this way, you'll know how to gain trust instantly, grab attention, set emotional bonds and become likable for everyone you want (no exaggeration here!). Then you'll learn some extremely effective time-proven techniques that make people share with you even the darkest secrets. More of that, those people will be obliged to you for providing them with this possibility. So, with these techniques, you'll be able not only to get any information you need but also gain many friends and admirers. That's a pleasant side effect.
Finally, in Section 4 we'll see how all the techniques we've learned work in the wild. We'll consider three different Social Engineering scenarios. You'll see how an ethical hacker, an intelligence officer and a police officer can use these techniques to establish their missions on obtaining secrets.
And of course, in the final video, you'll find the answer on how to protect yourself from even the most sophisticated Social Engineering attacks and keep your secrets safe. You'll know, You'll understand why untrained people can't fight back a social engineering attack and what do you need and how to train yourself to be able to spot and stop a Social Engineering attack and never fall prey to Social Engineer.
Did I tell you that this course would change your life? Now you know how exactly. Imagine yourself, possessing all these skills. Imagine how you apply them and get fantastic results. Imagine yourself as a person who can reveal any secret...
Well, are you ready? Let’s kick off.
Who this course is for:
- Security specialists
- Ethical hackers and penetration testers
- Private investigators
- Law enforcement officers
- Business intelligence specialists
- Negotiators
- Journalists
Instructor
Sergii Nesterenko is a Cybersecurity Consultant, Penetration Tester, Cybersecurity Trainer, Educator and Writer. He has more than 20 years of hands-on experience in different security domains, including investigations, counter fraud, OSINT and risk assessment. Since 2012, he has been working in the cybersecurity field.
Besides hands-on work, Sergii is the author of many publications on security, cybersecurity, counter fraud and counter cyber espionage issues. He is the co-author of two books about intelligence agencies activity and the author of a book about counter fraud techniques.
Sergii is the author of video courses “Cybersecurtity attacks (Red Team activity) and “Cybersecurity: Methods of protection (Blue-Team activity) released by Pack Publishing in 2018.
Also, he works as a Content/Technical Writer for Comodo Cybersecurity.
He really loves to share information that helps to make this world a more safe and secure place
Mass media about Sergii Nesterenko:
“Sergii is a cybersecurity consultant and penetration tester with rich experience in the information security field. He has consulted for international business companies, military staff, NGOs, politicians, members of Parliament, law enforcement, and other VIPs on security issues. His wide knowledge of information technologies and human psychology enables him to elaborate effective technologies to prevent and overcome even the most cunning cyberattacks… Sergii is also the author of the video course Cybersecurity Attacks (Red Team Activity) that was released by Packt Publishing in February. He is also well-known for his publications and lectures on cybersecurity, anti-fraud, and counter-cyberespionage issues”.
“Social engineering attacks: how to defend against them and how to fight back”, "Techgenix", May 30, 2018