2016
Pluralsight
Troy Hunt and Lars Klint
1:38
English
Despite how robust computer security may be, there remains a serious threat within any system: the people using it. Social engineering is an enormously powerful technique which exploits human weaknesses such as greed, fear and even attributes we consider positive such as sympathy and generosity, in order to compromise security systems and give an attacker access to sensitive information. In this Play by Play, Troy and Lars discuss various techniques that adversaries use to coerce their targets into performing actions that they wouldn’t normally do. These range from very simple techniques that even your kids use, to sophisticated human manipulation practices designed to compromise large scale systems.
Course Overview
2m 11s
Course Overview 2m 11s
Computer-based Social Engineering
22m 28s
What Is Social Engineering? 5m 46s
Computer-based Social Engineering - SPAM Email 3m 38s
Computer-based Social Engineering - Phishing with BeEF 9m 32s
Social Media Phishing with Cross-site Scripting 3m 29s
Human-based Social Engineering
37m 56s
Common Examples of Human-based Social Engineering 5m 37s
Social Engineering Devices 10m 27s
How Social Engineers Gain Access 3m 52s
Social Engineering Reconaissance - Open Source Intelligence (OSINT) 10m 6s
How Do We Protect Against Social Engineering? 7m 52s
pluralsight.com/courses/play-by-play-social-engineering
Download File Size:473.9 MB