HOME > IT & Software > The Art of Hacking Humans- Intro to Social Engineering

The Art of Hacking Humans- Intro to Social Engineering

SynopsisThe Art of Hacking Humans: Intro to Social Engineering, avail...
The Art of Hacking Humans- Intro to Social Engineering  No.1

The Art of Hacking Humans: Intro to Social Engineering, available at Free, has an average rating of 4, with 15 lectures, 11 quizzes, based on 321 reviews, and has 29331 subscribers.

Free Enroll Now

You will learn about Define social engineering. Give some examples of social engineering techniques. Explain social engineers exploit victims. Identify common social engineering messages. This course is ideal for individuals who are Employers and employees who need to understand why their information assets need to be protected. or Beginner students of information security or Anybody who wants to learn how to be safe in the information age. It is particularly useful for Employers and employees who need to understand why their information assets need to be protected. or Beginner students of information security or Anybody who wants to learn how to be safe in the information age.

Enroll now: The Art of Hacking Humans: Intro to Social Engineering

Summary

Title: The Art of Hacking Humans: Intro to Social Engineering

Price: Free

Average Rating: 4

Number of Lectures: 15

Number of Quizzes: 11

Number of Published Lectures: 15

Number of Published Quizzes: 11

Number of Curriculum Items: 26

Number of Published Curriculum Objects: 26

Original Price: Free

Quality Status: approved

Status: Live

What You Will Learn

  • Define social engineering.
  • Give some examples of social engineering techniques.
  • Explain social engineers exploit victims.
  • Identify common social engineering messages.
  • Who Should Attend

  • Employers and employees who need to understand why their information assets need to be protected.
  • Beginner students of information security
  • Anybody who wants to learn how to be safe in the information age.
  • Target Audiences

  • Employers and employees who need to understand why their information assets need to be protected.
  • Beginner students of information security
  • Anybody who wants to learn how to be safe in the information age.
  • We are constantly exposed to various threats regarding our information in this day-and-age. We are becoming more and more connected to networks like the Internet with a lot of our daily activities – both and work and play – revolve around a digital device or platform or the other; this increases our vulnerability to compromise by malicious attackers. A very common method used by malicious attackers to compromise information and information systems is social engineering. This takes advantage of human weakness to initiate or execute an attack or breach.

    This course seeks to give a basic overview of social engineering to the beginner. It introduces the concept of social engineering and some common social engineering techniques, and how these techniques can be used to manipulate victims resulting in compromise.

    Note: Although email addresses are generally redacted in sample social engineering messages shown in the course, bear in mind that any email address and names of apparent senders of such messages contained herein might be hacked. That is to say the names and email addresses that appear might belong to innocent people, but might have been hijacked.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: What is Cyber Security, what is Social Engineering?

    Lecture 3: Why Social Engineering?

    Lecture 4: Brief Historical Overview

    Lecture 5: Common Social Engineering Techniques

    Chapter 2: Social Engineering Techniques

    Lecture 1: Pretexting

    Lecture 2: Piggy-backing

    Lecture 3: Shoulder Surfing

    Lecture 4: Dumpster Diving

    Lecture 5: Phishing

    Lecture 6: Scam messages

    Lecture 7: Baiting

    Lecture 8: Chain Messages

    Chapter 3: Summary

    Lecture 1: Conclusion

    Chapter 4: Bonus

    Lecture 1: Bonus

    Instructors

  • The Art of Hacking Humans- Intro to Social Engineering  No.2
    Dauda Sule
    Cyber security enthusiast
  • Rating Distribution

  • 1 stars: 25 votes
  • 2 stars: 19 votes
  • 3 stars: 75 votes
  • 4 stars: 106 votes
  • 5 stars: 96 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!