Course curriculum

    1. Ethical and Responsible Use of Knowledge

    2. Course Outline

    1. 1.1 Different Types of Hackers

    2. 1.2 Hackers, Scammers, & Social Engineers: Differences

    3. 1.3 Hackers, Scammers, & Social Engineers: Similarities

    4. 1.4 Notable Hackers, Scammers, & Social Engineers

    5. 1.5 Myth Behind Social Engineering

    6. 1.6 Social Engineering

    7. 1.7 The History and Evolution of Social Engineering

    8. 1.8 Social Engineering in Action

    9. Chapter Quiz

    1. 2.1 Introduction

    2. 2.2 Understanding the Psychological Principles Underlying Social Engineering Tactics

    3. 2.3 Discussing Common Cognitive Biases and Their Exploitation in Social Engineering

    4. 2.4 Exploring the "Human Factor" in Cybersecurity

    5. Chapter Quiz

    1. 3.1 Introduction

    2. 3.2 Explaining Various Types of Social Engineering Attacks

    3. 3.3 Looking Deeper at Phishing, Pharming, & Smishing

    4. 3.4 Pretexting: An In-Depth Explanation

    5. 3.5 Tailgating: A Comprehensive Overview

    6. 3.6 War Driving: A Comprehensive Overview

    7. 3.7 Impersonation

    8. 3.8 Access Card Spoofing and Cloning with Long-Range RFID Technology

    9. 3.9 Text Message Spoofing

    10. 3.10 Rubber Ducky

    11. Chapter Quiz

    1. 4.1 Introduction

    2. 4.2 Process of Selecting Targets for Social Engineering Attacks

    3. 4.3 Spear Phishing: A Sophisticated Targeting Technique

    4. 4.4 Creating Effective Profiles for Targets

    5. Chapter Quiz

    1. 5.1 Introduction

    2. 5.2 Introduction to Tools and Techniques

    3. 5.3 Demonstrating Information Gathering and Message Crafting

    4. 5.4 Discussing the Ethics of Using Social Engineering Tools and Techniques

    5. Chapter Quiz

About this course

  • $199.99
  • 61 lessons
  • 0 hours of video content

Discover your potential, starting today