Advanced Social Engineering
Provided by QA
Overview
The AntiSocial Engineer Limited provides a unique insight into both their own ethical social engineering assessments and malicious social engineering in the wild. Providing practical workshops, live demos to hone your attacking skills and teaching you the techniques needed to protect against social engineering attacks. Advanced Social Engineering aims to apply knowledge to a corporate scenario, giving security personnel the skills needed to implement a good level of social engineering defence within organisations.
+
Prerequisites
Learning Outcomes
Course attendees will learn about:
Course Outline
Planning a Social Engineering Attack - Underlying techniques used by social engineers in the planning stages of an attack.
+
The AntiSocial Engineer Limited provides a unique insight into both their own ethical social engineering assessments and malicious social engineering in the wild. Providing practical workshops, live demos to hone your attacking skills and teaching you the techniques needed to protect against social engineering attacks. Advanced Social Engineering aims to apply knowledge to a corporate scenario, giving security personnel the skills needed to implement a good level of social engineering defence within organisations.
+
Prerequisites
- This course is suitable for IT & security professionals.
- A good understanding of common IT procedures.
- Basic experience with command line and terminal.
Learning Outcomes
Course attendees will learn about:
- The Plan - Underlying techniques used by social engineers in the planning stages of an attack.
- The Attack - How to get past security measures and what happens next.
- Defence - What can an organisation do to defend against this?
- Post Covid - Trends in social engineering and how the attacks will vary in the future.
Course Outline
Planning a Social Engineering Attack - Underlying techniques used by social engineers in the planning stages of an attack.
- Complex fraud scenarios and planning for a realistic attack Phishing / SMShing / Vishing
- Gathering credentials
- Mailbox exfiltration
- Wireless attacks and network auditing
- Dumpster diving
- Pretexting
- Tailgaiting, Lockpicking and RFID cloning
- Using your pretext to gain entry
- Psychology techniques, impersonation
- Planting rogue network devices
- Level of access available
- Strong considerations to ethics and professionalism to avoid disruption
- Dealing with negative situations and reputational damage.
- Practical tips and advice on implementation.
- A look to more advanced features of attacks, reducing focus on metrics and statistics.
- We share what we have learnt so you can protect your organisation against physical attacks.
+
Enquire
Start date | Location / delivery | |
---|---|---|
No fixed date | United Kingdom | Book now |
01132207150
01132207150