The participant will learn how some of the most elegant social engineering attacks take place. Learn to perform these scenarios and what is done during each step of the attack, from imitation through exploitation. This course is intended to help you better prepare your organization for the defense of social engineering attacks, as well as how to ethically use these techniques for intelligence gathering.
Who Should Attend?
- Staff or consultant penetration testers are looking to increase their test breadth and effectiveness.
- Security defenders are looking to enhance their understanding of attack techniques to improve their defenses.
- Staff responsible for security awareness and education campaigns who want to understand how cybercriminals persuade their way through their defenses.