Class Details

Price: $1,745

Course Includes:

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available all day
  • Freshly baked cookies every afternoon - * only at participating locations

The three-day instructor-led training experience explores various aspects of social engineering including elicitation, pretexting, influence, and manipulation. The instructor applies real world examples to illustrate the effectiveness of social engineering and defending against those attacks.

Get Your Group Trained for Less with Our Federal Training Dollars Savings Plan

Course Outline

Module 1: Overview of Social Engineering

Module 2: Information Gathering

  • Lesson 2A: Gathering Information
  • Lesson 2B: Sources for Information Gathering
  • Lesson 2C: Communication Modeling
  • Module 2 Lab

Module 3: Elicitation

  • Lesson 3A: Elicitation Defined
  • Lesson 3B: Goals of Elicitation
  • Lesson 3C: Mastering Elicitation
  • Module 3 Lab

Module 4: Pretexting: How to Become Anyone

  • Lesson 4A: Pretexting Defined
  • Lesson 4B: Principles and Planning Stages of Pretexting
  • Lesson 4C: Successful Pretexting
  • Module 4 Lab

Module 5: Psychological Principles Used in Social Engineering

  • Lesson 5A: Modes of Thinking
  • Lesson 5B: Microexpressions
  • Lesson 5C: Neurolinguistic Programming (NLP)
  • Lesson 5D: Interview and Interrogation
  • Lesson 5E: Building Instant Rapport
  • Module 5 Lab

Module 6:  Influence and Persuasion

  • Lesson 6A: Fundamentals of Influence and Persuasion
  • Lesson 6B: Influence Tactics
  • Lesson 6C: Framing
  • Lesson 6D: Manipulation
  • Module 6 Lab

Module 7: Tools of the Social Engineer

  • Lesson 7A: Physical Tools
  • Lesson 7B: Online Information-Gathering Tools
  • Module 7 Lab

Module 8: Prevention and Mitigation

  • Lesson 8A: Learning to Identify Social Engineering Attacks
  • Lesson 8B: Creating a Personal Security Awareness Culture
  • Lesson 8C: Being Aware of the Value of Your Information
  • Lesson 8D: Keeping Software Updated
  • Lesson 8E: Developing Scripts
  • Lesson 8F: Social Engineering Audits