Path: news.nzbot.com!not-for-mail
NNTP-Posting-Date: Mon, 29 Aug 2016 18:52:43 -0500
From: NovRain <novrin@atoms.ru>
Newsgroups: alt.binaries.warez.quebec-hackers
Subject: 0829 - Lynda.com.Ethical.Hacking.Social.Engineering-ELOHiM - "elohim.nfo" - 254,75 MB - yEnc (1/1)
X-No-Archive: yes
Message-ID: <f6ryn0kVKan8QJnC8edD_20o20@JBinUp.local>
X-Newsreader: JBinUp 0.90 Beta 10 - Build: 845 (http://www.JBinUp.com)
Date: Mon, 29 Aug 2016 18:52:43 -0500
Lines: 27
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-BK6wVK7cV8RTaw3Z+DcLgGOTDqghoogZRQGl4r0OpFnZzd6BzqpG/rw0MR/q6zq9KbXyolM2Y0TUR5D!mg8cZOf41Ca5wmdu1YsKINJ6iK/7EKiq4103gdF+3D0Nzl7oAD8+/6ryJEEkIr6zARKn
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 4130
X-Received-Bytes: 4252
X-Received-Body-CRC: 3614799700
Xref: news.nzbot.com alt.binaries.warez.quebec-hackers:2118
elohim.nfo
RELEASE NAME....: Lynda.com.Ethical.Hacking.Social.Engineering-ELOHiM
RELEASE DATE....: 2016-08-29
RELEASE SIZE....: 18x15Mb
FORMAT..........: Bookware
LANGUAGE........: English
URL.............: http://www.lynda.com
Social engineering is a technique hackers use to manipulate end users and
obtain information about an organization or computer systems. In order to
protect their networks, IT security professionals need to understand
social engineering, who is targeted, and how social engineering attacks
are orchestrated.
In this course, cybersecurity expert Lisa Bock discusses the methods a
hacker might use, including embedding malicious links and attachments in
emails and using mobile devices and social media to deploy an attack. She
discusses the concept of "misuse of trust"—how hackers use charm, power,
and influence to penetrate an organization—and why you need to be extra
cautious with the disgruntled employee. Finally, Lisa discusses
countermeasures security professionals can take to address these attacks.
Note: This course maps to the Social Engineering competency of the
Certified Ethical Hacking exam. Review the exam objectives at
https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
Topics include:
* Visualizing the victim
* Recognizing an attack
* Using charm, power, and influence
* Manipulating with social media
* Preventing insider attacks
* Stealing identities
* Pen testing with social engineering
* Taking countermeasures
Subjects: Security, IT, CEH
Author: Lisa Bock
Level: Intermediate
Duration: 1h 18m
Released: 8/26/2016
|
|