一品教程
Cybrary IT - Social Engineering And Manipulation
  • 百度链接:请在正文中查找
  • 提取码:请在正文中查找
  • 阿里云(不限速):
  • 天翼链接(不限速):
  • 天翼提取:
  • 115链接:
  • 备用地址:
  • 解压密码:
  • 资源类型:
  • 文件大小: MB
  • 发布时间:2016-8-4 17:35
  • 人       气:144
  • 回复数量:0
发新帖
http://pan.baidu.com/s/1bdS16Q 密码: 3kud

Cybrary IT - Social Engineering and Manipulation
English | mp4 | H264 1280x720 | AAC 2 ch | pdf | 1.23 GBeLearningGet started with Social Engineering by viewing the course videos below. The intro to social engineering course covers, exploitation lifecycle, digital information gathering, targeting, digital profile reduction, elicitation, and more.
Social Engineering and Manipulation – Exploitation of the Human Element
Social engineering has been the cause of many of the most high profile cyber-attacks in recent years.
The human element is too often the problem. In this online, self-paced Social Engineering and Manipulation training class, you will learn how some of the most elegant social engineering attacks take place. Learn to perform these scenarios and what is done during each step of the attack, from imitation through exploitation.
This course is intended to help you better prepare your organization for defense of social engineering attacks, as well as how to ethically use these techniques for intelligence gathering. As a reminder, by taking this course, you agree to our terms of service.
Topics include: Intro to social engineering, exploitation lifecycle, digital information gathering, targeting, digital profile reduction, psychology of social engineering, elicitation, pretexting, cold calling, bypassing physical security, post exploitation, binary evasion and more.Tools include: Kali Linux, Social Engineering Toolkit (SET), Google, Maltego, Scythe Framework, Recon-NG Framework, Creepy, Portable Virtual Box, Metasploit, Hyperion & Veil
Pre-requisites: This class is intended for cyber security professionals who have at least a baseline understanding of penetration testing and security policy principles. Approximately two years of experience in cyber security or Certified Ethical Hacker certification (or comparable cert) is highly recommended. If you do not meet these pre-requisites, it is recommended that you complete our Security+ and Ethical Hacker classes, before beginning.


本站首发,永久链接:https://www.yipinsucai.com/thread-107775-1-1.html
收藏0 0 反对0
分享
  • 猜您喜欢
  • 热门素材
  • 下载排行
  • 最新资源

微信订阅号

Copyright   ©2012-2021  一品教程论坛技术支持:一品素材教程网  站点帮助   ( 蜀ICP备17010416号-1 )|网站地图 | 站点地图| 网站地图 | 网站地图