وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

Social Engineering: 13 Social Engineering attacks explained!

سرفصل های دوره

Complete Social Engineering course thought within ONE HOUR by EXPERT! HUMINT | Cyber security | CISO | Ransomware


1 - Introduction
  • 1 - Books.docx
  • 1 - Introduction What is social engineering
  • 1 - Social-engineering.pdf
  • 1 - Who is responsible for implementing security.html
  • 2 - CIAtraid.html
  • 2 - Security basics a brief history
  • 3 - 2023-data-breach-investigations-report-dbir.pdf
  • 3 - A classic and real a social engineering attack
  • 3 - Types of hackers.html
  • 4 - Security basics what are security risks
  • 4 - The weakest link.html
  • 5 - Bug-bounty-programs.docx
  • 5 - Security basics types of hackers
  • 6 - The weakest link

  • 2 - The social engineering attacks
  • 5 - Authority.html
  • 6 - Deceptive relations.html
  • 7 - Authority
  • 7 - Reflections-on-the-Stanford-Prison-Experiment-Gene.pdf
  • 7 - Social-Engineering-I-E-based-Model-of-Human-Weakness-for-Attack-and-Defense-Investigations.pdf
  • 7 - The-persuasion-and-security-awareness-experiment-reducing-the-success-of-social-engineering-attacks.pdf
  • 7 - Thirdparty relationships suppliers.html
  • 8 - Deceptive Relationships
  • 8 - Overloading.html
  • 8 - Social-Engineering-Attack-Examples-Templates-and-Scenarios.pdf
  • 8 - Social-Phishing.pdf
  • 9 - Overloading
  • 9 - Scarcity.html
  • 10 - Presentation-Social-Engineering.pdf
  • 10 - Scarcity
  • 10 - Social validation.html
  • 11 - A-Room-with-a-Viewpoint-Using-Social-Norms-to-Motivate-Environmental-Conservation-in-Hotels.pdf
  • 11 - BlackHat-USA-2010-Ryan-Getting-In-Bed-With-Robin-Sage-v1.0.pdf
  • 11 - Phishing.html
  • 11 - Presentation-Social-Engineering.pdf
  • 11 - Social validation
  • 12 - 2020-Phishing-Benchmark-Global-Report.pdf
  • 12 - Baiting.html
  • 12 - Internet-Security-Threat-Report-ISTR.pdf
  • 12 - Phishing
  • 12 - US-CERT-Technical-Trends-in-Phishing-Attacks.pdf
  • 13 - Baiting
  • 13 - Pharming.html
  • 13 - Users-Really-Do-Plug-in-USB-Drives-They-Find.pdf
  • 14 - A-dual-approach-to-detect-pharming-attacks-at-the-client-side.pdf
  • 14 - Pharming
  • 14 - Phone Phishing.html
  • 15 - IVR or Phone Phishing
  • 15 - Quid pro quo.html
  • 15 - Voice-pharming-attack-and-the-trust-of-VoIP-copy.pdf
  • 16 - Quid Pro Quo
  • 16 - SOCIAL-ENGINEERING-AND-CYBER-SECURITY.pdf
  • 16 - Tailgating.html
  • 17 - Tailgating

  • 3 - Extra videos
  • 17 - Shoulder surfing.html
  • 18 - Shoulder surfing
  • 18 - Unclean desk.html
  • 19 - SANS-clean-desk-policy.pdf
  • 19 - Unclean desk

  • 4 - Social engineering general remediation actions
  • 20 - Advanced-Social-Engineering-Attacks.pdf
  • 20 - A-Taxonomy-of-Attacks-and-a-Survey-of-Defence-Mechanisms-for-Semantic-Social-Engineering-Attacks.pdf
  • 20 - General remediation steps.html
  • 20 - Online-Social-Networks-Threats-and-Solutions.pdf
  • 20 - Social-Engineering-Attacks.pdf
  • 20 - Social-Engineering-in-the-Context-of-Cialdini-s-Psychology-of-Persuasion-and-Personality-Traits.pdf
  • 20 - US-CERT-Recognizing-and-Avoiding-Email-Scams.pdf
  • 20 - free-awareness-resources.pdf
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 32566
    حجم: 189 مگابایت
    مدت زمان: 42 دقیقه
    تاریخ انتشار: ۶ فروردین ۱۴۰۳
    دسته بندی محصول
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید