Skip to main content

Social Engineering Training: Deceptions and Defenses

Code: 2012 Category: Tag:

In this Social Engineering course you gain the knowledge to defend against social engineering deceptions that threaten organizational security. You will gain the social engineering awareness to learn what is a social engineering attack. You will learn to prevent data breaches by learning the motivations and methods used by social engineers to access sensitive data and exploit organizational vulnerabilities. Gain the skills to implement procedures to defeat deceptions, and mitigate personnel vulnerabilities with this social engineering awareness course.

In this social engineering prevention training course, you gain the skills to defend against social engineering attacks that threaten organizational security. You learn the technical and psychological methods of manipulation, impersonation and persuasion used by social engineers. Further, this course incorporates hands-on activities designed to understand the motivations and methods used by social engineers, to better protect your organization and prevent data breaches.

Social Engineering Training: Deceptions and Defenses Delivery Methods
After-course instructor coaching benefit
4thdacad end-of-course exam included
Social Engineering Training: Deceptions and Defenses Course Benefits
Defend against social engineering deceptions that threaten organizational securityPlan and evaluate security assessments for human weaknessesPromote vigilance and implement procedures to defeat deceptionsMitigate personnel vulnerabilities with security awarenessMeasure your organization’s preparedness for attacks
Social Engineering Course Outline
Introduction to Social Engineering

Evaluating the organizational risks

Assessing social engineering threats
Analyzing classic case studies

Thinking like a social engineer

Considering attack frameworks
Reviewing the methods of manipulation
Examining legal issues and social concerns
Gathering Information and Intelligence
Identifying Communication Models
Assessing Elicitation Methods
Gaining Physical Access
Impersonating Authorized Personnel
Employing Psychology for Persuasion
Implementing Management Countermeasures

Request Quotes

Register now
CAPTCHA image

Please type the characters This helps us prevent spam, thank you.

Finance and Accounting Training for Nonfinancial Managers

Introduction to VBA Programming Training

Cisco Mobility Express WiFi Solution Technical Training (CMEWFS)

Disaster Recovery and Business Continuity Training

Business Relationship Management (BRM) Training: Aligning IT & the Business

Self-Assessment Under CMMC 2.0 and NIST SP 800-171

IT Management Skills Training

Deploy and Manage Citrix ADC 13.x with Traffic Management Training (CNS225)

Automating Administration with PowerShell (AZ-040)

Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211)

arالعربية