
Pluralsight – Ethical Hacking: Social Engineering
English | Size: 615.18 MB (645,058,955 Bytes)
Category: CBTs
Security controls traditionally focus on securing the information systems people use. However, people themselves are frequently the weak link; social engineering exploits human behaviors to give the attacker the upper hand in ultimately achieving …
Security defenses within information systems focus primarily on technology controls, that is, security is implemented within physical appliances and software. These controls are frequently bypassed when the humans themselves are compromised by a social engineering attack. Social engineering involves compromising the individuals that use these systems. Attackers look to exploit weaknesses in human nature and coerce people into performing actions which give the attacker an advantage. In this course, we’ll look at various different social engineering techniques that can be used to compromise systems. We’ll also look at both computer-based and behavior-based tools to help defend against this risk. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Humans: The Soft Center Within the Hard Shell 29m 14s
A Walkthrough of a Social Engineering Attack 50m 28s
Reconnaissance and OSINT 37m 41s
Phishing Attacks 58m 46s
Identity Theft and Impersonation 45m 29s
Social Engineering Countermeasures 54m 47s
DOWNLOAD:
If any links die or problem unrar, send request to http://goo.gl/aUHSZc
BC says
26/11/2016 at 21:26all the links were no longer valid,
Thanks