Learn Social Engineering Attacks

Course

Online

£ 200 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

This course will teach you the most common social engineering threats and how to protect yourself and your systems from social engineering attacks.You'll learn how to perform attacks on targets using a wide variety of sites and tools, and develop payloads that effectively compromise the system.By the time you've completed this course, you will have a strong knowledge about social engineering.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Create Undetectable Backdoors for Windows
Create Evil Files that look and function like normal files
Create a Fake Login Page and use it to Steal Login Information
How to Exploit Browsers with BeEF Framework
Gain Full Control over the Target Machine using Evil Files
Perform the Attacks Outside the Local Network
How to Create a Phishing Email
Learn Different Techniques to Protect Yourself

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Ms Word
  • Network Training
  • Engineering
  • Web
  • Hacking
  • Network
  • Microsoft Word
  • Email
  • Internet
  • Word

Course programme

Introduction 1 lecture 01:44 Social Engineering Defined Introduction 1 lecture 01:44 Social Engineering Defined Social Engineering Defined Social Engineering Defined Social Engineering Defined Social Engineering Defined Evil Files 4 lectures 13:03 Create a Malicious File with MSFvenom How to Create an Undetectable Payload with FatRat Inject Payload in .exe file using Shellter Make A Malicious Microsoft Word Document Evil Files 4 lectures 13:03 Create a Malicious File with MSFvenom How to Create an Undetectable Payload with FatRat Inject Payload in .exe file using Shellter Make A Malicious Microsoft Word Document Create a Malicious File with MSFvenom Create a Malicious File with MSFvenom Create a Malicious File with MSFvenom Create a Malicious File with MSFvenom How to Create an Undetectable Payload with FatRat How to Create an Undetectable Payload with FatRat How to Create an Undetectable Payload with FatRat How to Create an Undetectable Payload with FatRat Inject Payload in .exe file using Shellter Inject Payload in .exe file using Shellter Inject Payload in .exe file using Shellter Inject Payload in .exe file using Shellter Make A Malicious Microsoft Word Document Make A Malicious Microsoft Word Document Make A Malicious Microsoft Word Document Make A Malicious Microsoft Word Document Exploitation 5 lectures 09:33 Meterpreter Basics Extract Saved Passwords with LaZagne Capture VNC Session How to view saved Wi-Fi passwords How to perform a Man-in-the-middle (MITM) attack Exploitation 5 lectures 09:33 Meterpreter Basics Extract Saved Passwords with LaZagne Capture VNC Session How to view saved Wi-Fi passwords How to perform a Man-in-the-middle (MITM) attack Meterpreter Basics Meterpreter Basics Meterpreter Basics Meterpreter Basics Extract Saved Passwords with LaZagne Extract Saved Passwords with LaZagne Extract Saved Passwords with LaZagne Extract Saved Passwords with LaZagne Capture VNC Session Capture VNC Session Capture VNC Session Capture VNC Session How to view saved Wi-Fi passwords How to view saved Wi-Fi passwords How to view saved Wi-Fi passwords How to view saved Wi-Fi passwords How to perform a Man-in-the-middle (MITM) attack How to perform a Man-in-the-middle (MITM) attack How to perform a Man-in-the-middle (MITM) attack How to perform a Man-in-the-middle (MITM) attack Social Engineering Tools 2 lectures 03:35 How To Create a Fake Login Page Using Setoolkit Blackeye Phishing Tool Social Engineering Tools 2 lectures 03:35 How To Create a Fake Login Page Using Setoolkit Blackeye Phishing Tool How To Create a Fake Login Page Using Setoolkit How To Create a Fake Login Page Using Setoolkit How To Create a Fake Login Page Using Setoolkit How To Create a Fake Login Page Using Setoolkit Blackeye Phishing Tool Blackeye Phishing Tool Blackeye Phishing Tool Blackeye Phishing Tool Browser Exploitation 3 lectures 06:40 How to Exploit Web Browsers with BeEF Hook Web Browsers with MITMf and BeEF Gain Full Control over the Target Machine using BeEF Browser Exploitation 3 lectures 06:40 How to Exploit Web Browsers with BeEF Hook Web Browsers with MITMf and BeEF Gain Full Control over the Target Machine using BeEF How to Exploit Web Browsers with BeEF How to Exploit Web Browsers with BeEF How to Exploit Web Browsers with BeEF How to Exploit Web Browsers with BeEF Hook Web Browsers with MITMf and BeEF Hook Web Browsers with MITMf and BeEF Hook Web Browsers with MITMf and BeEF Hook Web Browsers with MITMf and BeEF Gain Full Control over the Target Machine using BeEF Gain Full Control over the Target Machine using BeEF Gain Full Control over the Target Machine using BeEF Gain Full Control over the Target Machine using BeEF Attacking Outside The Local Network 4 lectures 08:48 Hacking Over the Internet Without Port Forwarding How To Use Setoolkit Outside The Local Network BeEF Attack Outside the Local Network Phishing Email Attack Attacking Outside The Local Network 4 lectures 08:48 Hacking Over the Internet Without Port Forwarding How To Use Setoolkit Outside The Local Network BeEF Attack Outside the Local Network Phishing Email Attack Hacking Over the Internet Without Port Forwarding Hacking Over the Internet Without Port Forwarding Hacking Over the Internet Without Port Forwarding Hacking Over the Internet Without Port Forwarding How To Use Setoolkit Outside The Local Network How To Use Setoolkit Outside The Local Network How To Use Setoolkit Outside The Local Network How To Use Setoolkit Outside The Local Network BeEF Attack Outside the Local Network BeEF Attack Outside the Local Network BeEF Attack Outside the Local Network BeEF Attack Outside the Local Network Phishing Email Attack Phishing Email Attack Phishing Email Attack Phishing Email Attack Security 3 lectures 04:33 How to Detect Meterpreter in Your PC Protect Yourself from Browser Exploits How to Avoid Phishing Attacks Security

Additional information

Desire to learn Basic IT Skills

Learn Social Engineering Attacks

£ 200 VAT inc.