"Our tailored course provided a well rounded introduction and also covered some intermediate level topics that we needed to know. Clive gave us some best practice ideas and tips to take away. Fast paced but the instructor never lost any of the delegates"
Brian Leek, Data Analyst, May 2022
• Maltego
• Shodan
• Buscador
• Google Alerts
• Google Dorks
• The Harvester
• Metagoofil
• Recon-NG
• Have I been pawned
• Listening Devices and Bugs
• USB Drop (Ducky USB)
• Dumpster diving
• Pre-Texting
• Tailgating
• Shoulder Surfing
• Lock Picking
• Impersonation
• Mobile phone recording
• Pre-Texting
• Impersonation
• Have I been Pawned
• Username and password harvesting
• Password Re-use
• Password cracking
• Hashing/Cracking Hash
• Dictionary/Brute Forcing
• Darknet
• Wireshark
• Network Miner
• Mobile Phone
• Probe Requests
• Fake AP/SSID/Rogue Access Point
• Rogue Network Devices
• Fake Iframe/Portal – Username and Password Capture
• De-authing Clients
• Untrusted APK (Gaining remote access to mobile phone - data, SMS, camera, photos etc.)
• Session Hijacking/Cookie Stealing
• Nessus
• CVE
• Virus Total
• Malware Testing
"Our tailored course provided a well rounded introduction and also covered some intermediate level topics that we needed to know. Clive gave us some best practice ideas and tips to take away. Fast paced but the instructor never lost any of the delegates"
Brian Leek, Data Analyst, May 2022
“JBI did a great job of customizing their syllabus to suit our business needs and also bringing our team up to speed on the current best practices. Our teams varied widely in terms of experience and the Instructor handled this particularly well - very impressive”
Brian F, Team Lead, RBS, Data Analysis Course, 20 April 2022
Sign up for the JBI Training newsletter to stay updated with world-class technology training opportunities, including Analytics, AI, ML, DevOps, Web, Backend and Security. Our Power BI Training Course is especially popular. Gain new skills, useful tips, and validate your expertise with an industry-leading organisation, all tailored to your schedule and learning preferences.
Our Social Engineering training course gives an insight into the vulnerabilities exposed to businesses from the ‘human factor’.
Social Engineering exploits flaws in human weakness and constitutes one of the highest threats to organisations today, as they are able to use deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Social engineering remains one of the most effective means of attacking organisations of all sizes. Attackers are becoming more sophisticated. and are using a multitude of attack vectors. Not only are they relying on technical means of attack but are exploiting human behaviour to gain information.
Your staff need to be able to identify and defend against attempted attacks, both in the work place and whilst away using corporate IT equipment.
CONTACT
+44 (0)20 8446 7555
Copyright © 2024 JBI Training. All Rights Reserved.
JB International Training Ltd - Company Registration Number: 08458005
Registered Address: Wohl Enterprise Hub, 2B Redbourne Avenue, London, N3 2BS
Modern Slavery Statement & Corporate Policies | Terms & Conditions | Contact Us