Our Social Engineering training course gives an insight into the vulnerabilities exposed to businesses from the ‘human factor’.
Social Engineering exploits flaws in human weakness and constitutes one of the highest threats to organisations today, as they are able to use deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Social engineering remains one of the most effective means of attacking organisations of all sizes. Attackers are becoming more sophisticated. and are using a multitude of attack vectors. Not only are they relying on technical means of attack but are exploiting human behaviour to gain information.
Your staff need to be able to identify and defend against attempted attacks, both in the work place and whilst away using corporate IT equipment.
• Maltego
• Shodan
• Buscador
• Google Alerts
• Google Dorks
• The Harvester
• Metagoofil
• Recon-NG
• Have I been pawned
• Listening Devices and Bugs
• USB Drop (Ducky USB)
• Dumpster diving
• Pre-Texting
• Tailgating
• Shoulder Surfing
• Lock Picking
• Impersonation
• Mobile phone recording
• Pre-Texting
• Impersonation
• Have I been Pawned
• Username and password harvesting
• Password Re-use
• Password cracking
• Hashing/Cracking Hash
• Dictionary/Brute Forcing
• Darknet
• Wireshark
• Network Miner
• Mobile Phone
• Probe Requests
• Fake AP/SSID/Rogue Access Point
• Rogue Network Devices
• Fake Iframe/Portal – Username and Password Capture
• De-authing Clients
• Untrusted APK (Gaining remote access to mobile phone - data, SMS, camera, photos etc.)
• Session Hijacking/Cookie Stealing
• Nessus
• CVE
• Virus Total
• Malware Testing
Classroom or Remote
Remote
Receive the latest version of this course by email & subscribe to our Newsletter
CONTACT
+44 (0)20 8446 7555
enquiries@jbinternational.co.uk
Corporate Policies Terms & Conditions
JB International Training Ltd - Company number 08458005
Registered address 1345 High Road, London, N20 9HR
POPULAR
AI & ML training course
React training course
Threat Modelling training course
Python for Data Analysts training course
Power BI training course
Machine Learning training course
Spring & Boot Microservices training course
Terraform training course
Kubernetes training course
C++ training course
Biztalk training course