Social Engineering
A tailored, in-depth course on the process of thought and execution of social engineering-related attacks and prevention/mitigation strategies.
40 hours
Management and Awarenesss
40 hours
Management and Awarenesss

ABOUT THE PROGRAM

Understanding social engineering gives you an advantage in heightening security and defending your organization from outside threats. By getting inside the mind of attackers and exploring the methods they use to penetrate and attack systems, trainees can identify the weaknesses and vulnerabilities. The assessment will help to mitigate and stop attacks before they happen. This process could prevent the company from experiencing data breaches or phishing exploits. Events that have been known to destroy companies. The company will also improve and security risk management and incident response strategies.
CYBERPRO’s Social Engineering course will provide its trainees with a blend of theoretical and practical exercises to improve their attack prevention and mitigation skills, helping them identify the vulnerabilities within their workspaces and work around them to preserve security.

The course covers the following topics:

DON'T TOUCH THIS TAB

It’s important to improve the accordion’s behaviour

Introduction to Social Engineering
  • Terminology
  • History
  • Use Cases
  • Attack Vectors
  • Attack Frameworks
  • Legal Issues
Intelligence and Reconnaissance
  • Anonymity and TOR
  • Recon Resources and Tools
  • Information Gathering
  • Physical Intelligence Gathering
  • Dumpster Diving and physical Recon
  • Google Dorks
  • Maltego, Recon-NG, The Harvester
  • Malware and Endpoint Security
Defense
  • Where to Protect Against SE Attacks
  • Case Studies
  • NIST Security Framework
  • Protecting Against Cialdini
  • Administrative Controls
  • Security Awareness
Psychology
  • Elements of Behavior
  • Neuro-Linguistic Programming (NLP)
  • Influencing
  • Elicitation
  • The Berlo Communications Model
  • Cialdini’s Principles of Persuasion
Attacks and Exploitation
  • Social Engineering Code of Ethics
  • The SE Attack Cycle Model
  • Planning a Physical Penetration Test
  • Physical Attack Techniques and Tools
  • The Social Engineering Toolkit
  • GoPhish Workshop
  • Body Language
Don't touch this tab
ABOUT CYBERPRO

About CYBERPRO was founded in cooperation with international information security and instruction authorities who bring to Israel world-leading cyber training technologies and a learning experience of the highest standard available today.

The partners include the IITC group which has been training graduates for the high tech industry for over 20 years, and was selected as the training center for the Cisco Company in Israel.

CYBERPRO’s advanced, sought-after training courses in the areas of infrastructures, information security and cyber are world famous. These training courses were developed by some of the best cyber experts in the world, for international security organizations that emphasize the high training capabilities, the professional learning methods and the unique training and practice technologies. Our connection with international groups allows our students to be exposed to unique employment opportunities in Israel and abroad.

The training and learning tracks are all based much hands-on practice and preparation for the industry and profession requirements, so they include technological labs and practice sessions using one of the most advanced simulators in the world.

COURSE INFO
    • C-Level managers
    • Employees
    • Information security teams
    • None
    • Understanding the human factor of cybersecurity threats
    • Familiarity with the common attack vectors and tool kit
    • Defense in General against SE attacks

INTERESTED? CONTACT US