CEH v11: Social Engineering, Insider Threats & Identity Theft

Ethical Hacker v11    |    Intermediate
  • 3 Videos | 55m 50s
  • Includes Assessment
  • Earns a Badge
Often times, the most insecure point in a network is not the network hosts, but the end user that works with it. In this course, you'll explore the concepts and tactics of social engineering attacks, where the end user becomes the vulnerable system. The most dangerous attack can come from inside your network. You'll also examine insider threats, including why they're effective, their organization impacts, and why they're difficult to detect and defend against. Identity theft is one of the most common and lucrative avenues of attack. To complete this course, you'll learn the basic concepts, motives, and goals behind identity theft attacks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • identify the impact to an organization that is compromised by social engineering attacks
    recognize characteristics of a social engineering attack
    recognize the phases of a social engineering attack
    recognize the types of social engineering attacks
    identify common scenarios involving insider threats
  • identify suspicious activity that could identify an insider threat
    recognize the different types of insider threats
    identify signs of identity theft
    recognize the reasons for identity theft

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.