Course Outline

Introduction

What is Social Engineering

  • Types of malware
  • The evolution of malware

Overview of Malware Attacks

  • Propagating
  • Non-propagating

Information Gathering

  • Domain information
  • Networking accounts
  • Maltego overview

Preparing the Penetration Testing Laboratory

  • Installing and configuring a virtual machine
  • Installing and configuring Maltego (information gathering tool)

Generating Evil Files

  • Installing and configuring BeeLogger
  • Implementing command lines scripts to access an operating system that uses bash
  • Creating an advanced backdoor
  • Creating a custom remote keylogger
  • Logging saved passwords
  • Executing payload
  • Reporting payload

Delivery Options

  • Initiating an SMTP server
  • Spoofing emails
  • Replicating any legitimate login page
  • Directing targets to access an evil URL

Social Engineering Prevention

  • Recognizing spoofed emails
  • Protecting against browser exploits
  • Detecting malware manually or using a sandbox

Summary and Conclusion

Requirements

  • Experience with information systems

Audience

  • Information system analysts
  14 Hours
 

Testimonials

Related Courses

Certified Chief Information Security Officer (CCISO)

  35 hours

Certified Ethical Hacker

  35 hours

Standard Java Security

  14 hours

Java and Web Application Security

  21 hours

Advanced Java Security

  21 hours

Advanced Java, JEE and Web Application Security

  28 hours

C/C++ Secure Coding

  21 hours

Microsoft SDL Core

  14 hours

.NET, C# and ASP.NET Security Development

  14 hours

Certificate of Cloud Security Knowledge

  14 hours

Fundamentals of Corporate Cyber Warfare

  14 hours

Open Source Cyber Intelligence - Introduction

  7 hours

Open Source Intelligence (OSINT) Advanced

  21 hours