Cyber Security Social Engineering - Hacking Human Firewalls

Video Tutorials, Courses


Cyber Security Social Engineering - Hacking Human Firewalls
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.96 GB | Duration: 3h 39mLearn from a Cyber Security leader with more than 18 years experience everything about Social Engineering
What you'll learn




Understand what Cyber Security Social Engineering is, how it works and how you can protect yourself and your organization against it
Learn how humans can easily be manipulated by a social engineer and how to identify and prevent such attacks
Learn with a lot of practical examples how hackers and fraudsters try to hack and how to detect and protect against them
Requirements
Online access during the course to access two practical attacking scenario videos (hosted on youtube) and walk through these attacks and learn how to protect against them
Even non-IT people or absolute beginners are able to understand and learn how social engineering works and how to protect against it
Description
Hacking people is the most effective hacking technique, has the highest success rate and is very difficult to detect and prevent against. Learn how to hack the human firewall and how to protect yourself and your organization against so called social engineering attacks where people get manipulated to do things they usually would not do and companies get way too easy hacked with the support of their own employees without them noticing.

This course is for non-IT people/absolute beginners up to cyber security professionals that want to get into social engineering.

Your teacher has over 18 years experience including a bachelor and master in Cyber Security and was within various expert and head of positions in the security government area, large international consulting and the banking industry.

Course Overview (around 3.5 hours of valuable content)

What is social engineering and how does it work

The human risk factor

Sensitive vs. non-sensitive information

Hacking into your e-mails, icloud and fotos with very little effort and information

How to protect against password reset attacks

Why social engineering is so dangerous

Types of Social Engineering (Phishing, Smishing, Whaling, Vishing, Impersonation, Dumpster Diving, Baiting, Tailgating)

How to prevent all those Social Engineering attacks

Social Engineering Framework and how to plan and perform a social engineering attack (Open Source Intelligence, Built Your Story, Attack Plan, Attack, Documentation)

(BONUS) Real life Social Engineering Scenarios and how to protect against them

What you can expect from this course:

Sharing long time experience in this area

Lots of practical and real life examples instead of just theoretical frameworks

A trainer that is motivated helping you to easily understand social engineering and protect yourself and your organization against these attacks

The content is shared in easy to understand language so that everyone (even non-IT people or absolute beginners) can learn social engineering and how to protect themselves

You´ll be provided the possibility to join a Cyber Security experts chat group and contact the instructor for questions

IMPORTANT: You will need to watch within lecture four a video on youtube as it shows you a practical social engineering attack that we will analyze and discuss in our course. This video cant be incorporated into the udemy plattform for legal / copyright reasons. Therefore you will need an active internet connection for this small part. The video only lasts 2 minutes.

Who this course is for:
Beginners
Non-IT people
Upcomming Cyber Professionals
Social Engineering enthusiasts
Future Social Engineers
All Levels that want to get into Social Engineering


https://uploadgig.com/file/download/48aD17e031c33641/Cyber_Security_Social_Engineering___Hacking_Human_Firewalls_part1.rar
https://uploadgig.com/file/download/1002882c380625A0/Cyber_Security_Social_Engineering___Hacking_Human_Firewalls_part2.rar
https://uploadgig.com/file/download/B414602bf10caA90/Cyber_Security_Social_Engineering___Hacking_Human_Firewalls_part4.rar
https://uploadgig.com/file/download/e1941eC1dC9a65a6/Cyber_Security_Social_Engineering___Hacking_Human_Firewalls_part5.rar
https://uploadgig.com/file/download/36cBbE772b678e07/Cyber_Security_Social_Engineering___Hacking_Human_Firewalls_part3.rar

https://rapidgator.net/file/79a8541a5404774297f6aae18b289b04/Cyber_Security_Social_Engineering___Hacking_Human_Firewalls_part1.rar.html
https://rapidgator.net/file/c022552279c2c6da2997fbeb7edf0067/Cyber_Security_Social_Engineering___Hacking_Human_Firewalls_part2.rar.html
https://rapidgator.net/file/cd4675c81deb5dc77f4f39f247cc098d/Cyber_Security_Social_Engineering___Hacking_Human_Firewalls_part4.rar.html
https://rapidgator.net/file/2c887ed5ca6f69f8823b8074764900e5/Cyber_Security_Social_Engineering___Hacking_Human_Firewalls_part3.rar.html
https://rapidgator.net/file/4014e4c9b149d800445c5e8b5755009b/Cyber_Security_Social_Engineering___Hacking_Human_Firewalls_part5.rar.html