×
Phoenix TS

Defending Against Social Engineering Attacks Training

This training illustrates the effectiveness of social engineering and defending against those attacks.

Course Overview

Our 3-day, instructor-led course is directed toward IT professionals responsible for protecting their organization’s sensitive data from social engineering and other attacks. It covers all aspects of social engineering, including:

  • Elicitation
  • Pretexting
  • Influence
  • Manipulation

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 240-667-7757.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

Overview of Social Engineering

  • Define social engineering
  • Role in today’s society
  • Four vectors of social engineering
  • SE Pyramid

Information Gathering

  • Gathering Information
  • Sources for Information Gathering
  • Communication Modeling
  • Lab

Elicitation

  • Elicitation Defined
  • Goals of Elicitation
  • Mastering Elicitation
  • Lab

Pretexting: How to Become Anyone

  • Pretexting Defined
  • Principles and Planning Stages of Pretexting
  • Successful Pretexting
  • Lab

Psychological Principles Used in Social Engineering

  • Modes of Thinking
  • Microexpressions
  • Neurolinguistic Programming (NLP)
  • Interview and Interrogation
  • Building Instant Rapport
  • Lab

Influence and Persuasion

  • Fundamentals of Influence and Persuasion
  • Influence Tactics
  • Framing
  • Manipulation
  • Lab

Tools of the Social Engineer

  • Physical Tools
  • Online Information-Gathering Tools
  • Lab

Prevention and Mitigation

  • Learning to Identify Social Engineering Attacks
  • Creating a Personal Security Awareness Culture
  • Being Aware of the Value of Your Information
  • Keeping Software Updated
  • Developing Scripts
  • Social Engineering Audits

Defending Against Social Engineering Attacks FAQs

Who should attend this training?

This course is designed for IT security professionals responsible for creating and enforcing security policies, promoting security awareness education, and protecting organizations against various attacks.

What is the recommend experience for individuals interested in this course?

We recommend that students have experience with IT security and hold a CompTIA Security+or EC-Council CEH certification or have the equivalent experience and knowledge.

What do students say about the Defending Against Social Engineering Attacks training course?

“Very professional, well paced course. I was able to connect onto the training initiative after the exercises were completed. Well structured course; I thought the instructor pulled everything together with questions that were asked after the chapters were completed”
Student, September 2018

“The class was great and I learned a lot of good information. The instructor is very professional with communicating the information to the students.”
Student, September 2018

Register Contact Us

$1,622 – $1,745

  • Price Match Guarantee

    We’ll match any competitor’s price quote. Call us at 240-667-7757.

  • Included in this Defending Against Social Engineering Attacks Training

    • 3 days instructor-led training
    • Defending Against Social Engineering Attacks Training training book
    • Notepad, pen and highlighter
    • Variety of bagels, fruits, doughnuts and cereal available at the start of class*
    • Tea, coffee and soda available throughout the day*
    • Freshly baked cookies every afternoon*
Subscribe now

Get new class alerts, promotions, and blog posts