Ethical Hacking: Social EngineeringEthical Hacking: Social Engineering
Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
Unknown, 2020
Current format, Unknown, 2020, , Available.Unknown, 2020
Current format, Unknown, 2020, , Available. Offered in 0 more formatsPrevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
Title availability
About
Contributors
Details
Publication
- Carpenteria, CA lynda.com, 2020.
Opinion
More from the community
Community lists featuring this title
There are no community lists featuring this title
Community contributions
There are no quotations from this title
There are no quotations from this title
From the community