Social Engineering and Sniffing

This course is included in our On-demand training solution.

Overview

Employees are often a major security concern in big business, as social engineering is one of the most used methods to gain information and thus allow corporate networks to be hacked. Sniffing of corporate networks is also a method that hackers use to gain access to corporate resources. This course examines different types of social engineering and identity theft, along with sniffing techniques such as flooding and spoofing, the tools used both to perform and prevent them, and countermeasures that can be taken. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience

Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites

A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration

90 min.

Course Objectives

Human-based Social Engineering

  • categorize examples of human-based social engineering
  • Computer-based Social Engineering and Insider Attacks

  • recognize methods for computer-based social engineering
  • identify examples of insider attacks
  • Phishing Attacks

  • identify types of phishing attacks
  • Social Engineering Countermeasures

  • identify the countermeasures for social engineering
  • Recommending Social Engineering Countermeasures

    Sniffing Tools and Techniques

  • recognize how ARP spoofing works
  • recognize how DNS spoofing works
  • recognize how to counter sniffing
  • ARP, MAC, and DNS Sniffing Techniques

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?