Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
What is Social Engineering
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Information Gathering
- Domain information
- Networking accounts
- Maltego overview
Preparing the Penetration Testing Laboratory
- Installing and configuring a virtual machine
- Installing and configuring Maltego (information gathering tool)
Generating Evil Files
- Installing and configuring BeeLogger
- Implementing command lines scripts to access an operating system that uses bash
- Creating an advanced backdoor
- Creating a custom remote keylogger
- Logging saved passwords
- Executing payload
- Reporting payload
Delivery Options
- Initiating an SMTP server
- Spoofing emails
- Replicating any legitimate login page
- Directing targets to access an evil URL
Social Engineering Prevention
- Recognizing spoofed emails
- Protecting against browser exploits
- Detecting malware manually or using a sandbox
Summary and Conclusion
Requirements
- Experience with information systems
Audience
- Information system analysts
14 Hours
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.