(Click Category to List Courses)

41 - IT-S Information Technology - Security and Audit

IT-S 155 - Social Engineering

Code Start Date Duration Venue
IT-S 155 06 March 2023 5 Days Istanbul Registration Form Link
IT-S 155 01 May 2023 5 Days Istanbul Registration Form Link
IT-S 155 12 June 2023 5 Days Istanbul Registration Form Link
IT-S 155 21 August 2023 5 Days Istanbul Registration Form Link
IT-S 155 16 October 2023 5 Days Istanbul Registration Form Link
IT-S 155 11 December 2023 5 Days Istanbul Registration Form Link
Please contact us for fees


Course Description

Every IT professional should know and understand the mentality of malicious hacker/social engineer to be able to defend his/her company’s IT systems. In many systems, the weakest point is the human itself and anyone, who does not posses any knowledge or awareness of cyber-attacks, is a potential target of social engineering attacks through manipulation.

Social Engineering Training offers both theoretical and practical knowledge on social engineering techniques. Social Engineering attacks are combination of art and technology and, to be better prepared for those types of attacks, any IT professional must know these attacks at the same level of a social engineer. 

Course Objectives

  • Helping participants to better prepare their organizations for defense of social engineering attacks
  • Ethically using these techniques for intelligence gathering
  • Increasing awareness of the complicated social engineering attacks and human manipulation
  • Understanding potential threats 

Who Should Attend?

  • Security officers
  • IS / IT Specialists / Analysts / Managers
  • IS / IT Auditors / Consultants
  • Security Specialists / Analysts
  • Security Managers / Architectures
  • Security Consultants / Professionals
  • Systems Engineers

Course Details/Schedule

Day 1

  • Introduction to Social Engineering
  • Exploitation Life-Cycle
  • Human Manipulation
  • Social Engineering Techniques
  • Introduction to Kali Linux

Day 2

  • Introduction to Google Hacking
  • Using Advanced Search for Google Hacking
  • Google Hacking Database
  • Case Studies

Day 3

  • Information Gathering
  • Introduction to Maltego
  • Information Gathering with Maltego
  • Introduction to Recon-NG
  • Information Gathering with Recon-NG

Day 4

  • Targeting Techniques (Active vs. Passive Targeting)
  • Introduction to Social Engineering Toolkit (SET)
  • Case studies with SET
  • How to use Cupp and Cewl
  • Case studies with Cupp and Cewl

Day 5

  • Introduction to Shodan
  • How to use Scythe and Creepy
  • Case studies with Scythe and Creepy
  • Detection and Prevention
  • Increasing Awareness