Type to search LearningTree.com

Do you mean "{{response.correctedQuery}}" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.

 

Security Training









Preferred method of contact?

Targeted Human Threats: Social Engineering Deceptions, Exploits and Defenses

COURSE TYPE

Practitioner

Course Number

2012

Duration

3 Days

Enroll

About This Course: Social engineering has been considered the number one cyber security threat by many industry resources. This course provides the skills to defend against social engineering attacks that threaten organizational security. Through hands-on exercises, you learn the motivations and methods used by social engineers to better protect your organization and prevent data breaches.

You Will Learn How To

  • Defend against social engineering deceptions that threaten organizational security
  • Plan and evaluate security assessments for human weaknesses
  • Promote vigilance and implement procedures to defeat deceptions
  • Mitigate personnel vulnerabilities with security awareness
  • Measure your organization’s preparedness for attacks

Course Outline

  • Introduction to Social Engineering

Evaluating the organizational risks

  • Assessing social engineering threats
  • Analyzing classic case studies

Thinking like a social engineer

  • Considering attack frameworks
  • Reviewing the methods of manipulation
  • Examining legal issues and social concerns
  • Gathering Information and Intelligence

Identifying information sources

  • Gathering information passively and actively
  • Leveraging social media
  • Exploiting Google hacking

Collecting target information

  • Ripping information from sites with theHarvester
  • Dumpster diving for secrets and intelligence
  • Profiling users for weaknesses

Minimizing information leaks

  • Securing information leaks
  • Implementing secure disposal policies
  • Pinpointing reconnaissance probes
  • Identifying Communication Models

Profiling an information architecture

  • Implementing the Berlo communication model
  • Source
  • Message
  • Channel
  • Receiver
  • Determining communication weaknesses

Addressing communication flaws

  • Verifying the source
  • Securing the information channel
  • Assessing Elicitation Methods

Drawing out information

  • Soliciting information
  • Interview techniques
  • Identifying elicitation tactics and goals

Mitigating information leaks

  • Maintaining situational awareness
  • Implementing scripted responses
  • Gaining Physical Access

Circumventing physical security

  • Identifying weak types of locks
  • Bypassing electronic access controls

Securing the environment

  • Implementing high security locks
  • Preventing lock bumping
  • Impersonating Authorized Personnel

Gaining access with a disguise

  • Identifying spoofing techniques
  • Discovering change blindness deception
  • Assessing Internet impersonation techniques

Defending against impersonation and forgery

  • Implementing techniques to verify identity
  • Avoiding skimmers and hidden technology threats
  • Employing Psychology for Persuasion

Examining human weaknesses

  • Leveraging Cialdini’s motivation factors
  • Identifying mindlessness dangers
  • Exploring commitment and consistency vulnerability

Compelling behavior

  • Exploiting social proofing
  • Taking advantage of implied authority
  • Demanding action with "quid pro quo"

Bolstering resistance to persuasion

  • Adhering to policy and rules
  • Recognizing risky situations
  • Learning to interpret and then recognize
  • Implementing Management Countermeasures

Assessing social engineering vulnerabilities

  • Conducting a penetration test
  • Creating a scope of work
  • Mitigating legal issues and embarrassment

Creating comprehensive policies

  • Establishing verification policies
  • Regulating the use of social networks
  • Delivering effective security awareness training
Show complete outline
Show Less

Course Schedule

Attend this live, instructor-led course In-Class or Online via AnyWare.

Hassle-Free Enrollment: No advance payment required.
Tuition due 30 days after your course.

Oct 5 - 7 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Nov 8 - 10 Ottawa/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Nov 30 - Dec 2 Rockville, MD/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Jan 4 - 6 Alexandria, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Apr 5 - 7 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

May 17 - 19 Ottawa/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

May 31 - Jun 2 Rockville, MD/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Jul 12 - 14 Alexandria, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via Anyware
In-Class

Guaranteed to Run

Bring this Course to Your Organization and Train Your Entire Team
For more information, call 1-888-843-8733 or click here

Tuition

Standard

$2650

Government

$2355

Course Tuition Includes:

After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.

Free Course Exam
You can take your course exam on the last day of your course and receive a Certificate of Achievement with the designation "Awarded with Distinction."

Prev
Next

Questions

Call 1-888-843-8733 or click here »

An experienced training advisor will happily answer any questions you may have and alert you to any tuition savings to
which you or your organization may be entitled.

Training Hours

Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm


FREE Online Course Exam (if applicable) – Last Day: 3:30 pm – 4:30 pm
By successfully completing your FREE online course exam, you will:

  • Have a record of your growth and learning results.
  • Bring proof of your progress back to your organization
  • Earn credits toward industry certifications (if applicable)
  • Make progress toward one or more Learning Tree Specialist & Expert Certifications (if applicable)

Enhance Your Credentials with Professional Certification

Learning Tree's comprehensive training and exam preparation guarantees that you will gain the knowledge and confidence to achieve professional certification and advance your career.

This course is approved by CompTIA for continuing education units (CEUs). For additional information and to confirm which courses are eligible towards your CompTIA certification, click here.

This course qualifies for 17 CPE credits from the National Association of State Boards of Accountancy CPE program. Read more ...

- ,

Prev
Next