MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.96 GB | Duration: 3h 39m
Learn from a Cyber Security leader with more than 18 years experience everything about Social Engineering
What you'll learn
Understand what Cyber Security Social Engineering is, how it works and how you can protect yourself and your organization against it
Learn how humans can easily be manipulated by a social engineer and how to identify and prevent such attacks
Learn with a lot of practical examples how hackers and fraudsters try to hack and how to detect and protect against them
Requirements
Online access during the course to access two practical attacking scenario videos (hosted on youtube) and walk through these attacks and learn how to protect against them
Even non-IT people or absolute beginners are able to understand and learn how social engineering works and how to protect against it
Description
Hacking people is the most effective hacking technique, has the highest success rate and is very difficult to detect and prevent against. Learn how to hack the human firewall and how to protect yourself and your organization against so called social engineering attacks where people get manipulated to do things they usually would not do and companies get way too easy hacked with the support of their own employees without them noticing.
This course is for non-IT people/absolute beginners up to cyber security professionals that want to get into social engineering.
Your teacher has over 18 years experience including a bachelor and master in Cyber Security and was within various expert and head of positions in the security government area, large international consulting and the banking industry.
Course Overview (around 3.5 hours of valuable content)
What is social engineering and how does it work
The human risk factor
Sensitive vs. non-sensitive information
Hacking into your e-mails, icloud and fotos with very little effort and information
How to protect against password reset attacks
Why social engineering is so dangerous
Types of Social Engineering (Phishing, Smishing, Whaling, Vishing, Impersonation, Dumpster Diving, Baiting, Tailgating)
How to prevent all those Social Engineering attacks
Social Engineering Framework and how to plan and perform a social engineering attack (Open Source Intelligence, Built Your Story, Attack Plan, Attack, Documentation)
(BONUS) Real life Social Engineering Scenarios and how to protect against them
What you can expect from this course:
Sharing long time experience in this area
Lots of practical and real life examples instead of just theoretical frameworks
A trainer that is motivated helping you to easily understand social engineering and protect yourself and your organization against these attacks
The content is shared in easy to understand language so that everyone (even non-IT people or absolute beginners) can learn social engineering and how to protect themselves
You´ll be provided the possibility to join a Cyber Security experts chat group and contact the instructor for questions
IMPORTANT: You will need to watch within lecture four a video on youtube as it shows you a practical social engineering attack that we will analyze and discuss in our course. This video cant be incorporated into the udemy plattform for legal / copyright reasons. Therefore you will need an active internet connection for this small part. The video only lasts 2 minutes.
Who this course is for:
Beginners
Non-IT people
Upcomming Cyber Professionals
Social Engineering enthusiasts
Future Social Engineers
All Levels that want to get into Social Engineering
Homepage
https://www.udemy.com/course/cyber-security-social-engineering-hacking-human-firewalls/
Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me
https://hot4share.com/9uyorxkwvkca/wsszk.C.S.S.E..H.H.F.part1.rar.html
https://hot4share.com/tfajq61u7403/wsszk.C.S.S.E..H.H.F.part2.rar.html
https://hot4share.com/eusri83rnqzy/wsszk.C.S.S.E..H.H.F.part3.rar.html
https://hot4share.com/djjh859u1e7x/wsszk.C.S.S.E..H.H.F.part4.rar.html
https://hot4share.com/vh7szgfnfrzm/wsszk.C.S.S.E..H.H.F.part5.rar.html
https://uploadgig.com/file/download/3a6e457A8956D03a/wsszk.C.S.S.E..H.H.F.part1.rar
https://uploadgig.com/file/download/c9f1fb22D5cf12D6/wsszk.C.S.S.E..H.H.F.part2.rar
https://uploadgig.com/file/download/3a96ca9F728103b8/wsszk.C.S.S.E..H.H.F.part3.rar
https://uploadgig.com/file/download/154022bd104D7Ca7/wsszk.C.S.S.E..H.H.F.part4.rar
https://uploadgig.com/file/download/0483F91c07C81b35/wsszk.C.S.S.E..H.H.F.part5.rar
https://rapidgator.net/file/bbadb0686abc0ad2e2c7674178951c57/wsszk.C.S.S.E..H.H.F.part1.rar.html
https://rapidgator.net/file/bae8dd10ad0d0b7dfd08bd06659a79e5/wsszk.C.S.S.E..H.H.F.part2.rar.html
https://rapidgator.net/file/909fe094f1c268f347abd623d46d84a3/wsszk.C.S.S.E..H.H.F.part3.rar.html
https://rapidgator.net/file/b75509e2ce09b85e50b55f8ae50b6659/wsszk.C.S.S.E..H.H.F.part4.rar.html
https://rapidgator.net/file/f3420a9967186567450b47ca1f37416b/wsszk.C.S.S.E..H.H.F.part5.rar.html
https://nitro.download/view/A647C2310C0036A/wsszk.C.S.S.E..H.H.F.part1.rar
https://nitro.download/view/0A445D8BB4153C4/wsszk.C.S.S.E..H.H.F.part2.rar
https://nitro.download/view/A92D63F79828914/wsszk.C.S.S.E..H.H.F.part3.rar
https://nitro.download/view/FFC7A821FC6E36D/wsszk.C.S.S.E..H.H.F.part4.rar
https://nitro.download/view/8D1F516AF826EE5/wsszk.C.S.S.E..H.H.F.part5.rar