HOME > IT & Software > Hacking Humans Social Engineering 101

Hacking Humans Social Engineering 101

SynopsisHacking Humans – Social Engineering 101, available at $...
Hacking Humans Social Engineering 101  No.1

Hacking Humans – Social Engineering 101, available at $19.99, has an average rating of 4, with 19 lectures, 4 quizzes, based on 7 reviews, and has 23 subscribers.

You will learn about Understand WHY Social Engineers Do What They Do How to Spot Red Flags Early On The Most Common Social Engineering Methods Build a Strong Foundational Understanding of This Hacking Technique This course is ideal for individuals who are IT Professionals who want a better understanding of how to help their users stay safe or Beginning Cyber Security Professionals or People Who Are Interested in Penetration Testing It is particularly useful for IT Professionals who want a better understanding of how to help their users stay safe or Beginning Cyber Security Professionals or People Who Are Interested in Penetration Testing.

Enroll now: Hacking Humans – Social Engineering 101

Summary

Title: Hacking Humans – Social Engineering 101

Price: $19.99

Average Rating: 4

Number of Lectures: 19

Number of Quizzes: 4

Number of Published Lectures: 19

Number of Published Quizzes: 4

Number of Curriculum Items: 23

Number of Published Curriculum Objects: 23

Original Price: $19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Understand WHY Social Engineers Do What They Do
  • How to Spot Red Flags Early On
  • The Most Common Social Engineering Methods
  • Build a Strong Foundational Understanding of This Hacking Technique
  • Who Should Attend

  • IT Professionals who want a better understanding of how to help their users stay safe
  • Beginning Cyber Security Professionals
  • People Who Are Interested in Penetration Testing
  • Target Audiences

  • IT Professionals who want a better understanding of how to help their users stay safe
  • Beginning Cyber Security Professionals
  • People Who Are Interested in Penetration Testing
  • Social Engineers use shortcuts built into every human brain that allows anyone the ability to get people to do what they want.

    This happens WAY more than you’d think

    and it works more often than you would expect.

    In fact, people are the weakest link when it comes to cybersecurity.

    Don’t believe me?

    Have you ever gotten an email saying you received a large amount of money?

    Or got a phone call saying you had a problem with your computer?

    Those are very basic and VERY bad examples of social engineering but even they work.

    If they didn’t, these scams wouldn’t make any money and you would have never heard of them

    But we know that’s not the case.

    So the question is HOW does this work?

    In this course, you’ll learn the techniques used by social engineers by seeing real-world examples.

    Even if you can spot a fake email a mile away There are many other techniques a skilled professional can use.

    Whether you want to do penetration testing, or simply educate your clients, this course will give you the foundation you need to have a firm grasp on the concept of Social Engineering.

    I’ll be adding to this course over time, so once enrolled you can let me know what other information you’d like to see added.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: What is Social Engineering?

    Lecture 2: Is it Really a Problem?

    Chapter 2: Email Safety

    Lecture 1: Email Overview

    Lecture 2: Spam

    Lecture 3: Phishing

    Lecture 4: Spear Phishing

    Chapter 3: Phone Attacks

    Lecture 1: Phone Overview

    Lecture 2: Phone Scams

    Lecture 3: Phone Scam Examples and Best Practices

    Lecture 4: Vishing

    Lecture 5: Vishing – Examples & Best Practices

    Lecture 6: Smishing

    Lecture 7: Smishing – Examples & Best Practices

    Chapter 4: In-Person Tricks

    Lecture 1: In-Person Overview

    Lecture 2: Impersonation

    Lecture 3: USB Drop

    Lecture 4: USB Drop – Examples & Best Practices

    Chapter 5: Wrap-Up

    Lecture 1: Terms Used In Course

    Lecture 2: Sources

    Instructors

  • Hacking Humans Social Engineering 101  No.2
    Mark Beall
    Technology Expert – BS IT, GSEC, Security+, LPIC-1, Network+
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 0 votes
  • 3 stars: 3 votes
  • 4 stars: 3 votes
  • 5 stars: 1 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!