The Art of Hacking Humans: Intro to Social Engineering
The Art of Hacking Humans: Intro to Social Engineering, available at Free, has an average rating of 4, with 15 lectures, 11 quizzes, based on 321 reviews, and has 29331 subscribers.
You will learn about Define social engineering. Give some examples of social engineering techniques. Explain social engineers exploit victims. Identify common social engineering messages. This course is ideal for individuals who are Employers and employees who need to understand why their information assets need to be protected. or Beginner students of information security or Anybody who wants to learn how to be safe in the information age. It is particularly useful for Employers and employees who need to understand why their information assets need to be protected. or Beginner students of information security or Anybody who wants to learn how to be safe in the information age.
Enroll now: The Art of Hacking Humans: Intro to Social Engineering
Summary
Title: The Art of Hacking Humans: Intro to Social Engineering
Price: Free
Average Rating: 4
Number of Lectures: 15
Number of Quizzes: 11
Number of Published Lectures: 15
Number of Published Quizzes: 11
Number of Curriculum Items: 26
Number of Published Curriculum Objects: 26
Original Price: Free
Quality Status: approved
Status: Live
What You Will Learn
- Define social engineering.
- Give some examples of social engineering techniques.
- Explain social engineers exploit victims.
- Identify common social engineering messages.
Who Should Attend
- Employers and employees who need to understand why their information assets need to be protected.
- Beginner students of information security
- Anybody who wants to learn how to be safe in the information age.
Target Audiences
- Employers and employees who need to understand why their information assets need to be protected.
- Beginner students of information security
- Anybody who wants to learn how to be safe in the information age.
We are constantly exposed to various threats regarding our information in this day-and-age. We are becoming more and more connected to networks like the Internet with a lot of our daily activities – both and work and play – revolve around a digital device or platform or the other; this increases our vulnerability to compromise by malicious attackers. A very common method used by malicious attackers to compromise information and information systems is social engineering. This takes advantage of human weakness to initiate or execute an attack or breach.
This course seeks to give a basic overview of social engineering to the beginner. It introduces the concept of social engineering and some common social engineering techniques, and how these techniques can be used to manipulate victims resulting in compromise.
Note: Although email addresses are generally redacted in sample social engineering messages shown in the course, bear in mind that any email address and names of apparent senders of such messages contained herein might be hacked. That is to say the names and email addresses that appear might belong to innocent people, but might have been hijacked.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Lecture 2: What is Cyber Security, what is Social Engineering?
Lecture 3: Why Social Engineering?
Lecture 4: Brief Historical Overview
Lecture 5: Common Social Engineering Techniques
Chapter 2: Social Engineering Techniques
Lecture 1: Pretexting
Lecture 2: Piggy-backing
Lecture 3: Shoulder Surfing
Lecture 4: Dumpster Diving
Lecture 5: Phishing
Lecture 6: Scam messages
Lecture 7: Baiting
Lecture 8: Chain Messages
Chapter 3: Summary
Lecture 1: Conclusion
Chapter 4: Bonus
Lecture 1: Bonus
Instructors
-
Dauda Sule
Cyber security enthusiast
Rating Distribution
- 1 stars: 25 votes
- 2 stars: 19 votes
- 3 stars: 75 votes
- 4 stars: 106 votes
- 5 stars: 96 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024