Social Engineering Training Course
- Set up the required development environment to begin creating custom malware.
- Infiltrate legitimate web applications without detection.
- Transmit malicious files disguised as common file types.
- Utilize social engineering tactics to lure targets into visiting a fake website.
- Interactive lectures and discussions.
- Numerous exercises and practice sessions.
- Practical implementation in a live-lab setting.
- To request a customized training for this course, please contact us to arrange the details.
Course Outline
Introduction
What is Social Engineering
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Information Gathering
- Domain information
- Networking accounts
- Maltego overview
Preparing the Penetration Testing Laboratory
- Installing and configuring a virtual machine
- Installing and configuring Maltego (information gathering tool)
Generating Evil Files
- Installing and configuring BeeLogger
- Implementing command lines scripts to access an operating system that uses bash
- Creating an advanced backdoor
- Creating a custom remote keylogger
- Logging saved passwords
- Executing payload
- Reporting payload
Delivery Options
- Initiating an SMTP server
- Spoofing emails
- Replicating any legitimate login page
- Directing targets to access an evil URL
Social Engineering Prevention
- Recognizing spoofed emails
- Protecting against browser exploits
- Detecting malware manually or using a sandbox
Summary and Conclusion
Requirements
- Experience with information systems
Audience
- Information system analysts
Need help picking the right course?
Social Engineering Training Course - Enquiry
Testimonials (2)
It was clear and with very good examples
Carlo Beccia - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at beginner-level cybersecurity professionals who wish to learn how to leverage AI for improved threat detection and response capabilities.
By the end of this training, participants will be able to:
- Understand AI applications in cybersecurity.
- Implement AI algorithms for threat detection.
- Automate incident response with AI tools.
- Integrate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level to advanced-level cybersecurity professionals who wish to elevate their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customize AI models for specific cybersecurity challenges.
- Develop automation workflows for threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves identifying security weaknesses in software, websites, or systems and reporting them responsibly to receive rewards or recognition.
This instructor-led live training (online or onsite) is designed for beginner-level security researchers, developers, and IT professionals who want to learn the basics of ethical bug hunting and how to engage in bug bounty programs.
By the end of this training, participants will be able to:
- Grasp the fundamental concepts of vulnerability discovery and bug bounty initiatives.
- Utilize essential tools such as Burp Suite and browser developer tools for application testing.
- Detect common web security issues like XSS, SQLi, and CSRF.
- Submit clear and actionable vulnerability reports to bug bounty platforms.
Course Format
- Interactive lectures and discussions.
- Hands-on experience with bug bounty tools in simulated testing environments.
- Guided exercises centered on identifying, exploiting, and reporting vulnerabilities.
Customization Options for the Course
- To request a customized training session based on your organization's specific applications or testing requirements, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation offers an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance methods, and the tooling strategies employed by top-tier bug bounty hunters.
This instructor-led training (delivered online or on-site) is designed for intermediate to advanced security researchers, penetration testers, and bug bounty hunters who aim to automate their processes, expand their reconnaissance efforts, and identify intricate vulnerabilities across various targets.
Upon completion of this course, participants will be able to:
- Automate the process of reconnaissance and scanning for multiple targets.
- Utilize state-of-the-art tools and scripts in bounty automation.
- Detect complex, logic-based vulnerabilities that go beyond standard scans.
- Create customized workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Practical use of advanced tools and scripting for automation.
- Guided labs focused on real-world bounty workflows and sophisticated attack chains.
Customization Options
- To request a tailored training session based on your specific bounty targets, automation requirements, or internal security challenges, please contact us to arrange this customization.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is tailored to equip Cyber Crime and Fraud Investigators with skills in electronic discovery and advanced investigative methods. This course is crucial for anyone dealing with digital evidence during investigations.
Through the Certified Digital Forensics Examiner training, participants learn the methodology for conducting a computer forensic examination. They will be trained to apply sound investigative techniques to assess the scene, gather and document pertinent information, interview relevant personnel, maintain chain-of-custody, and prepare a comprehensive findings report.
The Certified Digital Forensics Examiner course is valuable for organizations, individuals, government entities, and law enforcement agencies that aim to pursue litigation, establish guilt, or take corrective action based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler program offers a systematic framework for the effective and efficient management and response to cybersecurity incidents.
This live, instructor-led training, available either online or on-site, is designed for intermediate-level IT security professionals seeking to cultivate the tactical expertise required to plan, categorize, contain, and oversee security incidents.
Upon completion of this training, participants will be equipped to:
- Grasp the incident response lifecycle and its distinct phases.
- Carry out procedures for incident detection, classification, and notification.
- Implement containment, eradication, and recovery strategies with precision.
- Formulate post-incident reporting and continuous improvement strategies.
Course Format
- Interactive lectures followed by group discussions.
- Practical application of incident handling protocols within simulated environments.
- Facilitated exercises concentrating on detection, containment, and response workflows.
Customization Options
- To arrange a customized training session tailored to your organization's specific incident response procedures or tools, please contact us for further details.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to implement CTEM in their organizations.
By the end of this training, participants will be able to:
- Understand the principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilize tools and technologies for continuous threat management.
- Develop strategies to validate and improve security measures continuously.
Cyber Emergency Response Team (CERT)
7 HoursThis course covers the management of an incident response team. It highlights the role of first responders in light of the frequent and intricate cyber attacks prevalent today, making incident response a vital function for organizations.
Incident response serves as the final line of defense; detecting and effectively reacting to incidents necessitates robust management processes. Leading an incident response team demands specific skills and expertise.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at advanced-level cyber security professionals who wish to understand Cyber Threat Intelligence and learn skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in the UAE (online or onsite) covers the different aspects of enterprise security, from AI to database security. It also includes coverage of the latest tools, processes and mindset needed to protect from attacks.
DeepSeek for Cybersecurity and Threat Detection
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to leverage DeepSeek for advanced threat detection and automation.
By the end of this training, participants will be able to:
- Utilize DeepSeek AI for real-time threat detection and analysis.
- Implement AI-driven anomaly detection techniques.
- Automate security monitoring and response using DeepSeek.
- Integrate DeepSeek into existing cybersecurity frameworks.
Digital Investigations - Advanced
21 HoursIn this course, you will gain an understanding of the principles and methodologies involved in digital forensics investigations, along with a comprehensive overview of various computer forensics tools. You will delve into essential forensic procedures to guarantee that evidence is admissible in court, as well as explore the legal and ethical considerations.
You will acquire skills to conduct forensic analyses on both Unix/Linux and Windows systems across multiple file systems. Additionally, you will cover advanced topics such as wireless, network, web, database, and mobile crime investigations.
Certified Lead Ethical Hacker
35 HoursWhy Should You Attend?
The Certified Lead Ethical Hacker training course equips you with the essential skills to conduct information system penetration tests using established principles, procedures, and techniques. This will help identify potential vulnerabilities within a computer network. Throughout this course, you'll acquire the knowledge and abilities needed to lead a penetration testing project or team and execute both internal and external pentests in line with standards like the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Additionally, you will learn how to draft comprehensive reports and propose effective countermeasures. Through practical exercises, you'll also master penetration testing methods and gain the skills necessary for managing a pentest team as well as handling customer communication and conflict resolution.
The Certified Lead Ethical Hacker training course offers an in-depth technical perspective on information security through ethical hacking practices, including common techniques such as gathering intelligence and detecting vulnerabilities both within and outside of business networks.
This training is also aligned with the NICE (National Initiative for Cybersecurity Education) Protect and Defend framework.
Upon mastering the required knowledge and skills in ethical hacking, you can take the exam to earn the "PECB Certified Lead Ethical Hacker" credential. Holding this PECB certification will demonstrate your proficiency in performing and managing penetration tests according to industry best practices.
Who Should Attend?
- Individuals interested in IT Security, especially those keen on ethical hacking, whether for further knowledge or as part of a career shift.
- Information security officers and professionals aiming to master ethical hacking and penetration testing techniques.
- Managers or consultants looking to understand how to oversee the penetration testing process.
- Auditors who wish to conduct professional penetration tests.
- Individuals responsible for safeguarding information systems within an organization.
- Technical experts interested in learning how to prepare a pentest.
- Cybersecurity professionals and members of information security teams.