CEH v12: Social Engineering, Insider Threats, and Identity Theft

CEH v12    |    Intermediate
  • 3 videos | 1h 11m 13s
  • Includes Assessment
  • Earns a Badge
Often times, the most insecure point in a network is not the network hosts, but the end user that works with it. In this course, you'll explore the concepts and tactics of social engineering attacks, where the end user becomes the vulnerable system. The most dangerous attack can come from inside your network. You'll also examine insider threats, including why they're effective, their organization impacts, and why they're difficult to detect and defend against. Identity theft is one of the most common and lucrative avenues of attack. To complete this course, you'll learn the basic concepts, motives, and goals behind identity theft attacks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Identify the impact to an organization that is compromised by social engineering attacks
    recognize characteristics of a social engineering attack
    recognize the types of social engineering attacks
    recognize the phases of a social engineering attack
    Recognize the different types of insider threats
  • identify suspicious activity that could identify an insider threat
    identify common scenarios involving insider threats
    Recognize the reasons for identity theft
    identify signs of identity theft

IN THIS COURSE

  • Locked
    1.  Social Engineering Concepts and Attacks
    26m 52s
    After completing this video, you will be able to recognize the concepts and tactics of social engineering attacks, where the end user becomes the vulnerable system. FREE ACCESS
  • Locked
    2.  Insider Threats
    23m 24s
    Upon completion of this video, you will be able to describe attacks by insider threats, including why they're so effective, how they can impact organizations, and why they're so difficult to detect and defend against. FREE ACCESS
  • Locked
    3.  Identity Theft
    20m 57s
    After completing this video, you will be able to describe the basic concepts, motives, and goals behind identity theft attacks. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 30 users Rating 4.8 of 30 users (30)
Rating 4.6 of 68 users Rating 4.6 of 68 users (68)