Social Engineering Training: Deceptions and Defenses

Level: Intermediate
Rating: 4.8/5 4.85/5 Based on 60 Reviews

In this Social Engineering course you gain the knowledge to defend against social engineering deceptions that threaten organizational security. You will gain the social engineering awareness to learn what is a social engineering attack. You will learn to prevent data breaches by learning the motivations and methods used by social engineers to access sensitive data and exploit organizational vulnerabilities. Gain the skills to implement procedures to defeat deceptions, and mitigate personnel vulnerabilities with this social engineering awareness course.

Key Features of this Social Engineering Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Defend against social engineering deceptions that threaten organizational security
  • Plan and evaluate security assessments for human weaknesses
  • Promote vigilance and implement procedures to defeat deceptions
  • Mitigate personnel vulnerabilities with security awareness
  • Measure your organization’s preparedness for attacks

Certifications/Credits:

CompTIA CPE 17 Credits

Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 3-day instructor-led training course
  • One-on-one after course instructor coaching
  • Earn 17 NASBA CPEs (live, in-class training only)
  • Earn 17 CompTIA CEUs
  • Pay later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard $2650

Government $2355

RESERVE SEAT

PRODUCT #2012

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

In Class & Live, Online Training

Time Zone Legend:
Eastern Time Zone Central Time Zone
Mountain Time Zone Pacific Time Zone

Note: This course runs for 3 Days

  • Jan 8 - 10 9:00 AM - 4:30 PM EST Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Reserve Your Seat

  • May 20 - 22 9:00 AM - 4:30 PM EDT Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • Jun 24 - 26 9:00 AM - 4:30 PM EDT Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Important Social Engineering Course Information

  • Course Description

    In this course, you gain the skills to defend against social engineering attacks that threaten organizational security. You learn the technical and psychological methods of manipulation, impersonation and persuasion used by social engineers. Further, this course incorporates hands-on activities designed to understand the motivations and methods used by social engineers, to better protect your organization and prevent data breaches.

Social Engineering Course Outline

  • Introduction to Social Engineering

    Evaluating the organizational risks

    • Assessing social engineering threats
    • Analyzing classic case studies

    Thinking like a social engineer

    • Considering attack frameworks
    • Reviewing the methods of manipulation
    • Examining legal issues and social concerns
  • Gathering Information and Intelligence

    Identifying information sources

    • Gathering information passively and actively
    • Leveraging social media
    • Exploiting Google hacking

    Collecting target information

    • Ripping information from sites with theHarvester
    • Dumpster diving for secrets and intelligence
    • Profiling users for weaknesses

    Minimizing information leaks

    • Securing information leaks
    • Implementing secure disposal policies
    • Pinpointing reconnaissance probes
  • Identifying Communication Models

    Profiling an information architecture

    • Implementing the Berlo communication model
    • Source
    • Message
    • Channel
    • Receiver
    • Determining communication weaknesses

    Addressing communication flaws

    • Verifying the source
    • Securing the information channel
  • Assessing Elicitation Methods

    Drawing out information

    • Soliciting information
    • Interview techniques
    • Identifying elicitation tactics and goals

    Mitigating information leaks

    • Maintaining situational awareness
    • Implementing scripted responses
  • Gaining Physical Access

    Circumventing physical security

    • Identifying weak types of locks
    • Bypassing electronic access controls

    Securing the environment

    • Implementing high security locks
    • Preventing lock bumping
  • Impersonating Authorized Personnel

    Gaining access with a disguise

    • Identifying spoofing techniques
    • Discovering change blindness deception
    • Assessing Internet impersonation techniques

    Defending against impersonation and forgery

    • Implementing techniques to verify identity
    • Avoiding skimmers and hidden technology threats
  • Employing Psychology for Persuasion

    Examining human weaknesses

    • Leveraging Cialdini’s motivation factors
    • Identifying mindlessness dangers
    • Exploring commitment and consistency vulnerability

    Compelling behavior

    • Exploiting social proofing
    • Taking advantage of implied authority
    • Demanding action with "quid pro quo"

    Bolstering resistance to persuasion

    • Adhering to policy and rules
    • Recognizing risky situations
    • Learning to interpret and then recognize
  • Implementing Management Countermeasures

    Assessing social engineering vulnerabilities

    • Conducting a penetration test
    • Creating a scope of work
    • Mitigating legal issues and embarrassment

    Creating comprehensive policies

    • Establishing verification policies
    • Regulating the use of social networks
    • Delivering effective security awareness training

Team Training

Social Engineering Training FAQs

  • What is social engineering?

    Social engineering is what it is called when hackers manipulate people to give up confidential information. There are many forms of social engineering.

  • What is a social engineering attack?

    It is an attack that relies heavily on human interaction and uses manipulation to have people break normal security procedures and practices.

  • Can I learn social engineering awareness online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition!
  • No advance payment required for most products.
  • Tuition can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

Ottawa / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Ottawa / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français