TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 155 - Social Engineering

Code Start Date Duration Venue
IT-S 155 11 December 2023 5 Days Istanbul Registration Form Link
IT-S 155 01 January 2024 5 Days Istanbul Registration Form Link
IT-S 155 26 February 2024 5 Days Istanbul Registration Form Link
IT-S 155 25 March 2024 5 Days Istanbul Registration Form Link
IT-S 155 22 April 2024 5 Days Istanbul Registration Form Link
IT-S 155 20 May 2024 5 Days Istanbul Registration Form Link
IT-S 155 03 June 2024 5 Days Istanbul Registration Form Link
IT-S 155 15 July 2024 5 Days Istanbul Registration Form Link
IT-S 155 12 August 2024 5 Days Istanbul Registration Form Link
IT-S 155 09 September 2024 5 Days Istanbul Registration Form Link
IT-S 155 07 October 2024 5 Days Istanbul Registration Form Link
IT-S 155 04 November 2024 5 Days Istanbul Registration Form Link
IT-S 155 30 December 2024 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

Every IT professional should know and understand the mentality of malicious hacker/social engineer to be able to defend his/her company’s IT systems. In many systems, the weakest point is the human itself and anyone, who does not posses any knowledge or awareness of cyber-attacks, is a potential target of social engineering attacks through manipulation.

Social Engineering Training offers both theoretical and practical knowledge on social engineering techniques. Social Engineering attacks are combination of art and technology and, to be better prepared for those types of attacks, any IT professional must know these attacks at the same level of a social engineer. 

Course Objectives

  • Helping participants to better prepare their organizations for defense of social engineering attacks
  • Ethically using these techniques for intelligence gathering
  • Increasing awareness of the complicated social engineering attacks and human manipulation
  • Understanding potential threats 

Who Should Attend?

  • Security officers
  • IS / IT Specialists / Analysts / Managers
  • IS / IT Auditors / Consultants
  • Security Specialists / Analysts
  • Security Managers / Architectures
  • Security Consultants / Professionals
  • Systems Engineers

Course Details/Schedule

Day 1

  • Introduction to Social Engineering
  • Exploitation Life-Cycle
  • Human Manipulation
  • Social Engineering Techniques
  • Introduction to Kali Linux

Day 2

  • Introduction to Google Hacking
  • Using Advanced Search for Google Hacking
  • Google Hacking Database
  • Case Studies

Day 3

  • Information Gathering
  • Introduction to Maltego
  • Information Gathering with Maltego
  • Introduction to Recon-NG
  • Information Gathering with Recon-NG

Day 4

  • Targeting Techniques (Active vs. Passive Targeting)
  • Introduction to Social Engineering Toolkit (SET)
  • Case studies with SET
  • How to use Cupp and Cewl
  • Case studies with Cupp and Cewl

Day 5

  • Introduction to Shodan
  • How to use Scythe and Creepy
  • Case studies with Scythe and Creepy
  • Detection and Prevention
  • Increasing Awareness