Companies Home Search Profile

Social Engineering: 13 Social Engineering attacks explained!

Focused View

Soerin Bipat

41:08

8 View
  • 1 - Books.docx
  • 1 - Introduction What is social engineering.mp4
    02:30
  • 1 - Social-engineering.pdf
  • 1 - Who is responsible for implementing security.html
  • 2 - CIAtraid.html
  • 2 - Security basics a brief history.mp4
    04:06
  • 3 - 2023-data-breach-investigations-report-dbir.pdf
  • 3 - A classic and real a social engineering attack.mp4
    01:55
  • 3 - Types of hackers.html
  • 4 - Security basics what are security risks.mp4
    02:26
  • 4 - The weakest link.html
  • 5 - Bug-bounty-programs.docx
  • 5 - Security basics types of hackers.mp4
    01:29
  • 6 - The weakest link.mp4
    01:55
  • 5 - Authority.html
  • 6 - Deceptive relations.html
  • 7 - Authority.mp4
    02:04
  • 7 - Reflections-on-the-Stanford-Prison-Experiment-Gene.pdf
  • 7 - Social-Engineering-I-E-based-Model-of-Human-Weakness-for-Attack-and-Defense-Investigations.pdf
  • 7 - The-persuasion-and-security-awareness-experiment-reducing-the-success-of-social-engineering-attacks.pdf
  • 7 - Thirdparty relationships suppliers.html
  • 8 - Deceptive Relationships.mp4
    01:52
  • 8 - Overloading.html
  • 8 - Social-Engineering-Attack-Examples-Templates-and-Scenarios.pdf
  • 8 - Social-Phishing.pdf
  • 9 - Overloading.mp4
    01:20
  • 9 - Scarcity.html
  • 10 - Presentation-Social-Engineering.pdf
  • 10 - Scarcity.mp4
    01:34
  • 10 - Social validation.html
  • 11 - A-Room-with-a-Viewpoint-Using-Social-Norms-to-Motivate-Environmental-Conservation-in-Hotels.pdf
  • 11 - BlackHat-USA-2010-Ryan-Getting-In-Bed-With-Robin-Sage-v1.0.pdf
  • 11 - Phishing.html
  • 11 - Presentation-Social-Engineering.pdf
  • 11 - Social validation.mp4
    03:08
  • 12 - 2020-Phishing-Benchmark-Global-Report.pdf
  • 12 - Baiting.html
  • 12 - Internet-Security-Threat-Report-ISTR.pdf
  • 12 - Phishing.mp4
    02:45
  • 12 - US-CERT-Technical-Trends-in-Phishing-Attacks.pdf
  • 13 - Baiting.mp4
    02:16
  • 13 - Pharming.html
  • 13 - Users-Really-Do-Plug-in-USB-Drives-They-Find.pdf
  • 14 - A-dual-approach-to-detect-pharming-attacks-at-the-client-side.pdf
  • 14 - Pharming.mp4
    01:56
  • 14 - Phone Phishing.html
  • 15 - IVR or Phone Phishing.mp4
    01:11
  • 15 - Quid pro quo.html
  • 15 - Voice-pharming-attack-and-the-trust-of-VoIP-copy.pdf
  • 16 - Quid Pro Quo.mp4
    01:50
  • 16 - SOCIAL-ENGINEERING-AND-CYBER-SECURITY.pdf
  • 16 - Tailgating.html
  • 17 - Tailgating.mp4
    01:53
  • 17 - Shoulder surfing.html
  • 18 - Shoulder surfing.mp4
    02:34
  • 18 - Unclean desk.html
  • 19 - SANS-clean-desk-policy.pdf
  • 19 - Unclean desk.mp4
    02:24
  • 20 - Advanced-Social-Engineering-Attacks.pdf
  • 20 - A-Taxonomy-of-Attacks-and-a-Survey-of-Defence-Mechanisms-for-Semantic-Social-Engineering-Attacks.pdf
  • 20 - General remediation steps.html
  • 20 - Online-Social-Networks-Threats-and-Solutions.pdf
  • 20 - Social-Engineering-Attacks.pdf
  • 20 - Social-Engineering-in-the-Context-of-Cialdini-s-Psychology-of-Persuasion-and-Personality-Traits.pdf
  • 20 - US-CERT-Recognizing-and-Avoiding-Email-Scams.pdf
  • 20 - free-awareness-resources.pdf
  • Description


    Complete Social Engineering course thought within ONE HOUR by EXPERT! HUMINT | Cyber security | CISO | Ransomware

    What You'll Learn?


    • Identify the most common social engineering attacks (no coding!)
    • Explain the threat, impact and remediation for the most common attacks
    • Strengthen your personal firewall!
    • Prevent Ransomware through Social Engineering!
    • Get quick CISO level understanding of Social Enigneering
    • Cyber Security essential; understand the weakest link!
    • Understand Human Intelligence (HUMINT)

    Who is this for?


  • (Project) managers that depend on IT
  • Security managers tasked to deliver basic security awareness training
  • Anyone interested in the basics of social engineering, explained in layman’s terms
  • Managers that want to create a more secure organisational culture
  • Chief Information Security Officer (CISO)
  • Military officers
  • What You Need to Know?


  • Interest in cyber security
  • Interest in psychology
  • Open mind and a willingness to learn
  • [optional] watch the movie Catch me if you can (2002) to learn why you NEED this course
  • More details


    Description

    + Get instant access to FREE eBook!
    + Get instant access to course slides!
    + Easy to understand how-to videos!
    + Access to instructor if you ever get stuck!


    This course will teach you the most common social engineering threats. At the end of the course you will understand why people are the weakest link in your organisations security posture. In other words, increase human intelligence (HUMINT) by updating your mental firewall and reduce the chance of Ransomware! After following this course you will understand:

    1) what the most common social engineering threats and are,
    2) the impact per threat for your business, 
    3) how these threats can be executed and / or mitigated. 

    You will able to understand the above-mentioned points without having to understand technical stuff (e.g. source code) within ONE HOUR!

    • Testimonial from Guido: A great election, very nice content and explications

    How is that possible?
    Social engineering / human intelligence is closely related to psychology. Social engineering can be defined as the art of manipulating people in order to achieve a goal. Therefore, this course is created for managers rather than developers. Managers must train their employees to strengthen their personal firewall (i.e. being less likely to fall victim to manipulation), because collectively all employees make up your organisation's firewall! 

    • Testimonial from Gaston: Very well explained!

    So, after following this course am I a full-fledged security/HUMINT expert? 
    No. This course will teach you the most common social engineering threats so that you can critically question and discuss the impact of these security issues with your employees and management. By following this course you'll become an expert in recognising social engineering attacks. Form the perspective of HUMINT you can use these attacks to collect data.  

    What!?! Why should I enroll?
    Only enroll when you want to strengthen your personal firewall, are new social engineering and want a complete beginners’ perspective. Social engineering is often the first step of a Ransomware attach, thus this course is mandatory for all employees! CISO's need to protect their cyber security resources, thus course is specifically developed for:

    - All employees, no prerequisite knowledge needed;
    - (Project) managers that lead in an organisation that depends on IT and have no clue how social engineering could harm their organisation; 
    - Security managers tasked to deliver basic security awareness training;
    - Anyone interested in the basics of social engineering, explained in layman’s terms

    Ok, but there is already a lot of information on available on the web. So, what’s in it for me?
    I thought you would never ask! This course differentiate itself from existing available information because: 

    - This course is not solely based on my opinion, but substantiated with scientific evidence. This means you not only get my opinion and experience but it is also backed by science;  
    - Unlike most other courses, you may actually claim 1 Continuing Professional Education (CPE) after finishing this course completely
    - I've included lots of links to websites that provide comprehensive background information, should you be interested in more detail; 
    - That's not it, there is more...   

    EXTRA material:
    - You will get a FREE eBook of the entire course!
    - Attacks that are not considered social engineering (e.g. shoulder surfing) are also included;
    - Frequently asked questions. Ask a social engineering question and I'll answer it with a video.

    Why include EXTRA material, is the main course not exciting enough?
    - Getting organisational security right goes well beyond instructing employees. With the bonus material, I would like to inform you about the complementary measures that should be taken into account.
    - The course also includes (though) quiz questions. These quizes will solidify your learning.

    • Testimonial from Arjuna: The sound quite low, but its fine. Soerin explain everything in a simple way. Thanks! Great Course


    I’m fully convinced of the benefits, but I don’t see why I should learn all this from you.
    True, let me explain by giving you an overview of my experience:
    - Chief Information Security Officer (CISO) and have managed Security, Privacy and Quality professionals. Often I'm responsible for implementing and maintaining a well balanced organisational risk posture;
    - Security and privacy operations manager (2 years). Acting as a security liaison on strategic accounts, I monitor the security of 2500+ workstations, 500+ servers and 10+ firewalls and routers, report on the operational security status of European and Dutch law and integrate intelligence results from AVDS, Check Point, Nagios, Nessus, Palo Alto Traps, SCCM, SCEP, SEP, SCOM and SIEM;
    - Parttime PhD Candidate (9 years - present). I read the science, you'll get the knowledge! What more do you want? 
    - Software quality consultant (6,5 years). I've advised many managers of large / small IT projects on various software related aspects; 
    - IT auditor (1 year). I have closely worked with accountants and audited large governmental IT projects; 
    - Quality assurance engineer (3 years). I have implemented large IT systems for large companies.  

    Besides experience as an IT consultant I hold the following certifications:

    • International Software Testing Qualifications Board (ISTQB)

    • Certified Secure Software Lifecycle professional (CSSLP)

    • Certified Information Systems Security Professional (CISSP)

    • Certified Information Systems Auditor (CISA)

    • Certified Information Privacy Professional (CIPP / Europe)

    • Certified SCRUM Master

    • Togaf Foundation

    • ISO 27001 Lead Auditor

    • ISO 27001 Lead Implementer

    • Leading Scaled Agile Framework

    • Azure Fundamentals (AZ-900)

    • PRINCE 2 foundation

    Go ahead click the enrol button, acclaim your FREE eBook and I'll see you in lesson 1!
    Keep learning about Cyber Security, increase HUMINT to prevent Ransomware thought by a CISO!

    Cheers,
    Soerin

    Who this course is for:

    • (Project) managers that depend on IT
    • Security managers tasked to deliver basic security awareness training
    • Anyone interested in the basics of social engineering, explained in layman’s terms
    • Managers that want to create a more secure organisational culture
    • Chief Information Security Officer (CISO)
    • Military officers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Soerin Bipat
    Soerin Bipat
    Instructor's Courses
    Soerin is a dedicated PhD candidate with 15+ years experience as information technology consultant. He specialises in teaching university students and clients in a wide range of topics (e.g. information security, research, software engineering, project management and statistics). He loves to read business related books, watch anime, and to work out. Your success in every way is important to me!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 19
    • duration 41:08
    • English subtitles has
    • Release Date 2024/03/11