alt.binaries.warez.quebec-hackersShow header Prev. Next
0829 - Lynda.com.Ethical.Hacking.Social.Engineering-ELOHiM - "elohim.nfo" - 254,75 MB - yEnc (1/1)
NovRain (novrin@atoms.ru) 2016/08/29 17:52

elohim.nfo



















     RELEASE NAME....: Lynda.com.Ethical.Hacking.Social.Engineering-ELOHiM
     RELEASE DATE....: 2016-08-29
     RELEASE SIZE....: 18x15Mb
     FORMAT..........: Bookware
     LANGUAGE........: English
     URL.............: http://www.lynda.com

     Social engineering is a technique hackers use to manipulate end users and
     obtain information about an organization or computer systems. In order to
     protect their networks, IT security professionals need to understand
     social engineering, who is targeted, and how social engineering attacks
     are orchestrated.

     In this course, cybersecurity expert Lisa Bock discusses the methods a
     hacker might use, including embedding malicious links and attachments in
     emails and using mobile devices and social media to deploy an attack. She
     discusses the concept of "misuse of trust"—how hackers use charm, power,
     and influence to penetrate an organization—and why you need to be extra
     cautious with the disgruntled employee. Finally, Lisa discusses
     countermeasures security professionals can take to address these attacks.

     Note: This course maps to the Social Engineering competency of the
     Certified Ethical Hacking exam. Review the exam objectives at
     https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.

     Topics include:
     * Visualizing the victim
     * Recognizing an attack
     * Using charm, power, and influence
     * Manipulating with social media
     * Preventing insider attacks
     * Stealing identities
     * Pen testing with social engineering
     * Taking countermeasures

     Subjects: Security, IT, CEH
     Author: Lisa Bock
     Level: Intermediate
     Duration: 1h 18m
     Released: 8/26/2016


Next Prev. Article List         Favorite