Our Social Engineering training course gives an insight into the vulnerabilities exposed to businesses from the ‘human factor’.
Social Engineering exploits flaws in human weakness and constitutes one of the highest threats to organisations today, as they are able to use deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Social engineering remains one of the most effective means of attacking organisations of all sizes. Attackers are becoming more sophisticated. and are using a multitude of attack vectors. Not only are they relying on technical means of attack but are exploiting human behaviour to gain information.
Your staff need to be able to identify and defend against attempted attacks, both in the work place and whilst away using corporate IT equipment.
• Google Alerts
• Google Dorks
• The Harvester
• Have I been pawned
• Listening Devices and Bugs
• USB Drop (Ducky USB)
• Dumpster diving
• Shoulder Surfing
• Lock Picking
• Mobile phone recording
• Have I been Pawned
• Username and password harvesting
• Password Re-use
• Password cracking
• Hashing/Cracking Hash
• Dictionary/Brute Forcing
• Network Miner
• Mobile Phone
• Probe Requests
• Fake AP/SSID/Rogue Access Point
• Rogue Network Devices
• Fake Iframe/Portal – Username and Password Capture
• De-authing Clients
• Untrusted APK (Gaining remote access to mobile phone - data, SMS, camera, photos etc.)
• Session Hijacking/Cookie Stealing
• Virus Total
• Malware Testing
Receive the latest version of this course by email & subscribe to our Newsletter
08/02/2018: The need for increased application security is dramatically changing the way software is built – for the better. By prioritising security during development, programmers are able to build applications that are less vulnerable to hacking and exploitation once deployed. In the age of the Global Data Protection Act, businesses need to be sure that their applications, and the data contained in them, are safe from hackers. Threat modelling – what it is Threat modelling is a structured process for identifying and quantifying security risks associated with your applications. The idea is to assess...
22/01/2018: The new Global Data Protection Regulation (GDPR) promises to be the biggest change in corporate information security since the original Data Protection Act 1998 came into force. Under GDPR, businesses have new responsibilities when handling personal data – and face huge penalties for breaches. Most corporate data is now held digitally, so the responsibility for implementing GDPR safeguards has (in most organisations) fallen to the IT department. Importantly, GDPR affects every item of personal data – including those details held in hard copy paper files – so everyone has a role to play...
15/01/2018: As 2018 gets under way, now is the perfect time to revisit the OWASP 2017 conference – and apply the best-practice guidelines discussed at the conference. Here are three key areas developers need to consider this year. An increased focus on mobile and embedded systems There have been two significant technology trends in recent years. First, mobile computing is (arguably) of greater importance than traditional desktop-based systems. Second, smart sensors are being deployed everywhere to create intelligent “Internet of Things” networks. As a result, both mobile and embedded systems are...
19/10/2017: A leading Financial Services organisation was keen to get several of its teams working consistently in an "Agile" way. Agile is an iterative approach to software delivery that builds software incrementally from the start of the project, instead of trying to do it all at once. Agile breaks projects down into user functionality called user stories, prioritizing them, and then continuously delivering them in short two week cycles called iterations This methodiology was to ensure better communication and project management for teams of Developers and Product owners. JBI's Scrum and Agile...
07/10/2017: This client was expanding its capability to deliver technical training across EMEA. It had recently acquired a large technology company which had at a stroke doubled its population of IT engineers and therefore the demand for training. JBI Training was initially one amongst a large group of training companies which has over the last 36 months been reduced to a much smaller group of trusted specialist providers. Training feeds into multiple management metrics and so the client had very specific requirements around how the course was provisioned by JBI and delivered by the trainer. These...
AI & ML training course
React training course
Threat Modelling training course
Python for Data Analysts training course
Power BI training course
Machine Learning training course
Spring & Boot Microservices training course
Terraform training course
Kubernetes training course
C++ training course
Biztalk training course