(Click Category to List Courses)

41 - IT-S Information Technology - Security and Audit


IT-S 155 - Social Engineering

Code Start Date Duration Venue Fees
IT-S 155 26 December 2020 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 23 January 2021 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 20 February 2021 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 20 March 2021 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 17 April 2021 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 12 June 2021 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 10 July 2021 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 07 August 2021 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 04 September 2021 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 02 October 2021 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 27 November 2021 5 Days Istanbul $ 3950 Registration Form Link
IT-S 155 25 December 2021 5 Days Istanbul $ 3950 Registration Form Link
DOWNLOAD PDF

 

Course Description

Every IT professional should know and understand the mentality of malicious hacker/social engineer to be able to defend his/her company’s IT systems. In many systems, the weakest point is the human itself and anyone, who does not posses any knowledge or awareness of cyber-attacks, is a potential target of social engineering attacks through manipulation.

Social Engineering Training offers both theoretical and practical knowledge on social engineering techniques. Social Engineering attacks are combination of art and technology and, to be better prepared for those types of attacks, any IT professional must know these attacks at the same level of a social engineer. 

Course Objectives

  • Helping participants to better prepare their organizations for defense of social engineering attacks
  • Ethically using these techniques for intelligence gathering
  • Increasing awareness of the complicated social engineering attacks and human manipulation
  • Understanding potential threats 

Who Should Attend?

  • Security officers
  • IS / IT Specialists / Analysts / Managers
  • IS / IT Auditors / Consultants
  • Security Specialists / Analysts
  • Security Managers / Architectures
  • Security Consultants / Professionals
  • Systems Engineers

Course Details/Schedule

Day 1

  • Introduction to Social Engineering
  • Exploitation Life-Cycle
  • Human Manipulation
  • Social Engineering Techniques
  • Introduction to Kali Linux

Day 2

  • Introduction to Google Hacking
  • Using Advanced Search for Google Hacking
  • Google Hacking Database
  • Case Studies

Day 3

  • Information Gathering
  • Introduction to Maltego
  • Information Gathering with Maltego
  • Introduction to Recon-NG
  • Information Gathering with Recon-NG

Day 4

  • Targeting Techniques (Active vs. Passive Targeting)
  • Introduction to Social Engineering Toolkit (SET)
  • Case studies with SET
  • How to use Cupp and Cewl
  • Case studies with Cupp and Cewl

Day 5

  • Introduction to Shodan
  • How to use Scythe and Creepy
  • Case studies with Scythe and Creepy
  • Detection and Prevention
  • Increasing Awareness