alt.binaries.warez.quebec-hackersPrev. Next
0829 - Lynda.com.Ethical.Hacking.Social.Engineering-ELOHiM - "elohim.nfo" - 254,75 MB - yEnc (1/1)
NovRain (novrin@atoms.ru) 2016/08/29 17:52

Path: news.nzbot.com!not-for-mail
NNTP-Posting-Date: Mon, 29 Aug 2016 18:52:43 -0500
From: NovRain <novrin@atoms.ru>
Newsgroups: alt.binaries.warez.quebec-hackers
Subject: 0829 - Lynda.com.Ethical.Hacking.Social.Engineering-ELOHiM - "elohim.nfo" - 254,75 MB - yEnc (1/1)
X-No-Archive: yes
Message-ID: <f6ryn0kVKan8QJnC8edD_20o20@JBinUp.local>
X-Newsreader: JBinUp 0.90 Beta 10 - Build: 845 (http://www.JBinUp.com)
Date: Mon, 29 Aug 2016 18:52:43 -0500
Lines: 27
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-BK6wVK7cV8RTaw3Z+DcLgGOTDqghoogZRQGl4r0OpFnZzd6BzqpG/rw0MR/q6zq9KbXyolM2Y0TUR5D!mg8cZOf41Ca5wmdu1YsKINJ6iK/7EKiq4103gdF+3D0Nzl7oAD8+/6ryJEEkIr6zARKn
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 4130
X-Received-Bytes: 4252
X-Received-Body-CRC: 3614799700
Xref: news.nzbot.com alt.binaries.warez.quebec-hackers:2118

elohim.nfo



















     RELEASE NAME....: Lynda.com.Ethical.Hacking.Social.Engineering-ELOHiM
     RELEASE DATE....: 2016-08-29
     RELEASE SIZE....: 18x15Mb
     FORMAT..........: Bookware
     LANGUAGE........: English
     URL.............: http://www.lynda.com

     Social engineering is a technique hackers use to manipulate end users and
     obtain information about an organization or computer systems. In order to
     protect their networks, IT security professionals need to understand
     social engineering, who is targeted, and how social engineering attacks
     are orchestrated.

     In this course, cybersecurity expert Lisa Bock discusses the methods a
     hacker might use, including embedding malicious links and attachments in
     emails and using mobile devices and social media to deploy an attack. She
     discusses the concept of "misuse of trust"—how hackers use charm, power,
     and influence to penetrate an organization—and why you need to be extra
     cautious with the disgruntled employee. Finally, Lisa discusses
     countermeasures security professionals can take to address these attacks.

     Note: This course maps to the Social Engineering competency of the
     Certified Ethical Hacking exam. Review the exam objectives at
     https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.

     Topics include:
     * Visualizing the victim
     * Recognizing an attack
     * Using charm, power, and influence
     * Manipulating with social media
     * Preventing insider attacks
     * Stealing identities
     * Pen testing with social engineering
     * Taking countermeasures

     Subjects: Security, IT, CEH
     Author: Lisa Bock
     Level: Intermediate
     Duration: 1h 18m
     Released: 8/26/2016


Next Prev. Article List         Favorite