Many novices to cybersecurity underestimate the importance of social engineering. More experienced hands understand that social engineering is probably the greatest threat to our networks. Many of the most significant hacks in history had a social engineering element including;
BlackEnergy3 attack against Ukraine's power grid
Target POS
2016 Presidential Campaign and DCCC email hack
Bangladesh Bank Heist
Twitter Bitcoin Scam
SONY Pictures
The Equifax breach
Okta super admin exploit
and so many more.
In addition, nearly every ransomware attack has a social engineering element.
Now with the advent of artificial intelligence, the threat of social engineering attacks is even greater.
![](https://static.wixstatic.com/media/6a4a49_3f2709160983408e90325eb82f020c66~mv2.png/v1/fill/w_980,h_551,al_c,q_90,usm_0.66_1.00_0.01,enc_auto/6a4a49_3f2709160983408e90325eb82f020c66~mv2.png)
To become an effective and well-rounded cyberwarrior, you must master social engineering!
The Art and Science of Social Engineering
Outline
1. What is Social Engineering?
2. Information Gathering
3. Elicitation
4. Pre-texting
5. Psychological Games and Manipulation
6. Persuasion
7.OSINT in Social Engineering
8.Using Artificial Intelligence in Social Engineering
8. The Latest Tools and Techniques of Social Engineering
9. Case Studies
This training will include theory and real-life cases,
including multiple tools to execute social engineering attacks.
To attend this live course with Master OTW, you must be a Subscriber PRO.
Don't miss this one-of-a-kind training!