CEH v11: Social Engineering, Insider Threats & Identity Theft
Ethical Hacker v11 | Intermediate
- 3 videos | 55m 50s
- Includes Assessment
- Earns a Badge
Often times, the most insecure point in a network is not the network hosts, but the end user that works with it. In this course, you'll explore the concepts and tactics of social engineering attacks, where the end user becomes the vulnerable system. The most dangerous attack can come from inside your network. You'll also examine insider threats, including why they're effective, their organization impacts, and why they're difficult to detect and defend against. Identity theft is one of the most common and lucrative avenues of attack. To complete this course, you'll learn the basic concepts, motives, and goals behind identity theft attacks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
identify the impact to an organization that is compromised by social engineering attacksrecognize characteristics of a social engineering attackrecognize the phases of a social engineering attackrecognize the types of social engineering attacksrecognize the different types of insider threats
identify common scenarios involving insider threatsidentify suspicious activity that could identify an insider threatrecognize the reasons for identity theftidentify signs of identity theft
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE