CompTIA PenTest+: Social Engineering Attacks
CompTIA PenTest+
| Intermediate
- 15 Videos | 1h 50m 47s
- Includes Assessment
- Earns a Badge
Social engineering involves the psychological manipulation of people and it's used to trick them into divulging information or performing certain actions. In this course, you'll learn how social engineering attacks are performed and how they can be used by attackers. You'll explore the pretext for a social engineering approach, as well as various social engineering attacks such as e-mail phishing, vishing, short message service, phishing, universal serial bus drop key, and watering hole. You'll then learn about tailgating, dumpster diving, shoulder surfing, and badge cloning physical attack methods. Lastly, you'll examine social engineering impersonation techniques, methods of influence, and tools. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseprovide an overview of the pretexting phase of social engineeringdifferentiate between whaling and spear phishing e-mail phishing attacksrecognize the characteristics of a short message service (SMS) phishing attackdescribe the dangers of lost and found thumb drivesprovide an overview of the vishing attack methoddescribe the characteristics of a watering hole attacklist characteristics of a tailgating attack
-
provide an overview of dumpster diving attacksdescribe how shoulder surfing can lead to data theftlist characteristics of badge cloning attacksdescribe how impersonation attacks workdifferentiate between social engineering attack toolslist methods of influence that can be used in a social engineering attacksummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 45sUP NEXT
-
2.The Pretexting Phase of Social Engineering8m 5s
-
3.E-mail Phishing Attacks7m 59s
-
4.Short Message Service Phishing6m 50s
-
5.USB Drop Attacks7m 13s
-
6.Vishing Attack Methods7m 58s
-
7.Watering Hole Attacks7m 37s
-
8.Tailgating Attacks8m 25s
-
9.Dumpster Diving Attacks7m 2s
-
10.Shoulder Surfing8m 51s
-
11.Badge Cloning7m 53s
-
12.Impersonation Attacks9m 30s
-
13.Social Engineering Attack Tools11m 58s
-
14.Social Engineering Methods of Influence8m 52s
-
15.Course Summary50s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.