وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Social Engineering: 13 Social Engineering attacks explained!

سرفصل های دوره

Complete Social Engineering course thought within ONE HOUR by EXPERT! HUMINT | Cyber security | CISO | Ransomware


1 - Introduction
  • 1 - Books.docx
  • 1 - Introduction What is social engineering
  • 1 - Social-engineering.pdf
  • 1 - Who is responsible for implementing security.html
  • 2 - CIAtraid.html
  • 2 - Security basics a brief history
  • 3 - 2023-data-breach-investigations-report-dbir.pdf
  • 3 - A classic and real a social engineering attack
  • 3 - Types of hackers.html
  • 4 - Security basics what are security risks
  • 4 - The weakest link.html
  • 5 - Bug-bounty-programs.docx
  • 5 - Security basics types of hackers
  • 6 - The weakest link

  • 2 - The social engineering attacks
  • 5 - Authority.html
  • 6 - Deceptive relations.html
  • 7 - Authority
  • 7 - Reflections-on-the-Stanford-Prison-Experiment-Gene.pdf
  • 7 - Social-Engineering-I-E-based-Model-of-Human-Weakness-for-Attack-and-Defense-Investigations.pdf
  • 7 - The-persuasion-and-security-awareness-experiment-reducing-the-success-of-social-engineering-attacks.pdf
  • 7 - Thirdparty relationships suppliers.html
  • 8 - Deceptive Relationships
  • 8 - Overloading.html
  • 8 - Social-Engineering-Attack-Examples-Templates-and-Scenarios.pdf
  • 8 - Social-Phishing.pdf
  • 9 - Overloading
  • 9 - Scarcity.html
  • 10 - Presentation-Social-Engineering.pdf
  • 10 - Scarcity
  • 10 - Social validation.html
  • 11 - A-Room-with-a-Viewpoint-Using-Social-Norms-to-Motivate-Environmental-Conservation-in-Hotels.pdf
  • 11 - BlackHat-USA-2010-Ryan-Getting-In-Bed-With-Robin-Sage-v1.0.pdf
  • 11 - Phishing.html
  • 11 - Presentation-Social-Engineering.pdf
  • 11 - Social validation
  • 12 - 2020-Phishing-Benchmark-Global-Report.pdf
  • 12 - Baiting.html
  • 12 - Internet-Security-Threat-Report-ISTR.pdf
  • 12 - Phishing
  • 12 - US-CERT-Technical-Trends-in-Phishing-Attacks.pdf
  • 13 - Baiting
  • 13 - Pharming.html
  • 13 - Users-Really-Do-Plug-in-USB-Drives-They-Find.pdf
  • 14 - A-dual-approach-to-detect-pharming-attacks-at-the-client-side.pdf
  • 14 - Pharming
  • 14 - Phone Phishing.html
  • 15 - IVR or Phone Phishing
  • 15 - Quid pro quo.html
  • 15 - Voice-pharming-attack-and-the-trust-of-VoIP-copy.pdf
  • 16 - Quid Pro Quo
  • 16 - SOCIAL-ENGINEERING-AND-CYBER-SECURITY.pdf
  • 16 - Tailgating.html
  • 17 - Tailgating

  • 3 - Extra videos
  • 17 - Shoulder surfing.html
  • 18 - Shoulder surfing
  • 18 - Unclean desk.html
  • 19 - SANS-clean-desk-policy.pdf
  • 19 - Unclean desk

  • 4 - Social engineering general remediation actions
  • 20 - Advanced-Social-Engineering-Attacks.pdf
  • 20 - A-Taxonomy-of-Attacks-and-a-Survey-of-Defence-Mechanisms-for-Semantic-Social-Engineering-Attacks.pdf
  • 20 - General remediation steps.html
  • 20 - Online-Social-Networks-Threats-and-Solutions.pdf
  • 20 - Social-Engineering-Attacks.pdf
  • 20 - Social-Engineering-in-the-Context-of-Cialdini-s-Psychology-of-Persuasion-and-Personality-Traits.pdf
  • 20 - US-CERT-Recognizing-and-Avoiding-Email-Scams.pdf
  • 20 - free-awareness-resources.pdf
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 32566
    حجم: 189 مگابایت
    مدت زمان: 42 دقیقه
    تاریخ انتشار: 6 فروردین 1403
    دسته بندی محصول
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید