Exploring SecOps Tools: Using the Social-Engineer Toolkit

SecOps 2022    |    Intermediate
  • 9 Videos | 57m 27s
  • Includes Assessment
  • Earns a Badge
The Social-Engineer Toolkit (SET) is used by security professionals and penetration testers to perform advanced attacks and social engineering. The SET offers attack vectors that help carry out human-side penetration testing exercises. In this course, you'll explore the SET and its capabilities and features. You'll also explore SET attack vectors, including phishing, web, infectious media generator, payload and listeners, and mass mailer attacks. Discover where to access installation files and how to install the SET. Learn how to start using the SET by launching the spear phishing module. Finally, explore how to perform web-­based attacks, a credential harvester attack, and a man-in-the-middle attack.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    provide an overview of the Social-Engineer Toolkit (SET)
    provide an overview of key Social-Engineer Toolkit (SET) features
    provide an overview of the different SET attack vectors including phishing, web, infectious media generator, payload and listeners, and mass mailer attacks
    download and install the Social-Engineer Toolkit (SET)
  • demonstrate how to access and use the spear phishing module in the Social-Engineering Toolkit
    launch a web-based attack in order to compromise a target
    demonstrate how to perform a credential harvester attack
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 7s
    UP NEXT
  • Playable
    2. 
    Social-Engineer Toolkit (SET)
    6m 40s
  • Locked
    3. 
    Social-Engineer Toolkit Features
    6m 15s
  • Locked
    4. 
    Social-Engineer Toolkit Attack Vectors
    7m 18s
  • Locked
    5. 
    Installing the Social-Engineer Toolkit
    8m 11s
  • Locked
    6. 
    Using the SET Spear Phishing Module
    12m 5s
  • Locked
    7. 
    Utilizing Website Attack Vectors
    7m 55s
  • Locked
    8. 
    Performing a Credential Harvester Attack
    7m 21s
  • Locked
    9. 
    Course Summary
    35s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.