Over time, industry has strengthened our network defenses with security appliances and anti-malware protection. As a result, the Black Hat Hackers seek to penetrate a softer target, the people in an organization by using social engineering.

Course By : Lisa Bock

 

In this course, you will explore another phase of ethical hacking, social engineering. you will cover concepts such as how attackers visualize the victim, the skills that are necessary to become a social engineer, and how to recognize an attack.

By the end of this course, you'll understand how social engineers exploit our trusting nature and use charm, power, and influence to obtain information or to get the target to complete an action, such as opening an attachment that contains malware or clicking on a link. you will learn how social engineers use different methods such as browsers, mobile devices, and social media to launch an attack.

 
In addition, you will learn why you should be caution of the disgruntled employee, insider attacks, and identity theft. This course is part of the Ethical Hacking series. Are you ready? Let's get started.
 
Click Next Down For The Next Chapter