We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Ethical Hacking

Social Engineering

Alexander Tushinsky

This course will teach you the social engineering skills needed for EC-Council’s Certified Ethical Hacker certification.

Read more

This course will teach you the social engineering skills needed for EC-Council’s Certified Ethical Hacker certification.

The EC-Council’s Certified Ethical Hacker certification serves as a starting point for many ethical hackers and teaches you the basics of penetration testing. In this course, Ethical Hacking: Social Engineering, you’ll learn social engineering tactics used by hackers. First, you’ll learn the various types of attack vectors such as phishing and impersonation. Next, you’ll discover aspects of physical security, and rogue websites, and Finally, you’ll learn how to guard against social engineering attacks. When you’re finished with this course, you’ll have the skills and knowledge of Social Engineering needed for EC-Council's Certified Ethical Hacker certification.

Enroll now

What's inside

Syllabus

Course Overview
Social Engineering
Consequences and Countermeasures
Course Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches skills, knowledge, and tools that are highly relevant to industry
Teaches skills, knowledge, and/or tools that are useful for personal growth and development
Taught by Alexander Tushinsky, who is recognized for their work in EC-Council
Develops Social Engineering and its techniques, which are core skills for ethical hacking
Examines social engineering, which is highly relevant to ethical hacking
Requires students to take EC-Council's Certified Ethical Hacker certification as a prerequisite

Save this course

Save Ethical Hacking: Social Engineering to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Ethical Hacking: Social Engineering. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Ethical Hacking: Social Engineering will develop knowledge and skills that may be useful to these careers:
Penetration Tester
Penetration Testers are ethical hackers who are hired to identify and exploit vulnerabilities in an organization's security systems. They work with clients to assess their security posture and to develop and implement security measures. The Ethical Hacking: Social Engineering course can be a valuable resource for Penetration Testers, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Penetration Testers to be more effective in their roles and to better protect their clients from cyber threats.
Security Consultant
Security Consultants are professionals who help organizations improve their security posture by identifying and mitigating vulnerabilities. They work with clients to assess their security needs, develop security plans, and implement security measures. The Ethical Hacking: Social Engineering course can be a valuable resource for Security Consultants, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Security Consultants to be more effective in their roles and to better protect their clients from cyber threats.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for monitoring and analyzing an organization's security systems and data for threats. They work with other IT professionals to develop and implement security policies and procedures, and they respond to security incidents. The Ethical Hacking: Social Engineering course can be a valuable resource for Cybersecurity Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Cybersecurity Analysts to be more effective in their roles and to better protect their organizations from cyber threats.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining an organization's security systems. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and respond to security incidents. The Ethical Hacking: Social Engineering course can be a valuable resource for Security Engineers, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Security Engineers to be more effective in their roles and to better protect their organizations from cyber threats.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and respond to security incidents. The Ethical Hacking: Social Engineering course can be a valuable resource for Information Security Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Information Security Analysts to be more effective in their roles and to better protect their organizations from cyber threats.
Malware Analyst
Malware Analysts are responsible for identifying, analyzing, and mitigating malware. They work with other security professionals to develop and implement security measures to protect organizations from malware attacks. The Ethical Hacking: Social Engineering course can be a valuable resource for Malware Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Malware Analysts to be more effective in their roles and to better protect their organizations from cyber threats.
Vulnerability Manager
Vulnerability Managers are responsible for identifying, assessing, and mitigating vulnerabilities in an organization's information systems and data. They work with other security professionals to develop and implement security measures to protect the organization from cyber threats. The Ethical Hacking: Social Engineering course can be a valuable resource for Vulnerability Managers, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Vulnerability Managers to be more effective in their roles and to better protect their organizations from cyber threats.
Forensic Analyst
Forensic Analysts are responsible for investigating and analyzing computer systems and data for evidence of criminal activity. They work with law enforcement and other investigators to collect and analyze evidence, and they testify in court about their findings. The Ethical Hacking: Social Engineering course can be a valuable resource for Forensic Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Forensic Analysts to be more effective in their roles and to better investigate and prevent cybercrimes.
Security Auditor
Security Auditors are responsible for assessing an organization's security posture and compliance with security regulations. They work with other IT professionals to develop and implement security measures to protect the organization from cyber threats. The Ethical Hacking: Social Engineering course can be a valuable resource for Security Auditors, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Security Auditors to be more effective in their roles and to better protect their organizations from cyber threats.
Risk Analyst
Risk Analysts are responsible for identifying, assessing, and mitigating risks to an organization's information systems and data. They work with other security professionals to develop and implement security measures to protect the organization from cyber threats. The Ethical Hacking: Social Engineering course can be a valuable resource for Risk Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Risk Analysts to be more effective in their roles and to better protect their organizations from cyber threats.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining an organization's network security systems. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and respond to security incidents. The Ethical Hacking: Social Engineering course can be a valuable resource for Network Security Engineers, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Network Security Engineers to be more effective in their roles and to better protect their organizations from cyber threats.
Cyber Threat Intelligence Analyst
Cyber Threat Intelligence Analysts are responsible for collecting and analyzing information about cyber threats. They work with other security professionals to develop and implement security measures to protect organizations from cyber attacks. The Ethical Hacking: Social Engineering course can be a valuable resource for Cyber Threat Intelligence Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Cyber Threat Intelligence Analysts to be more effective in their roles and to better protect their organizations from cyber threats.
Incident Responder
Incident Responders are responsible for responding to and mitigating security incidents. They work with other IT professionals to identify and contain the threat, and they restore the organization's systems and data to a safe state. The Ethical Hacking: Social Engineering course can be a valuable resource for Incident Responders, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Incident Responders to be more effective in their roles and to better protect their organizations from cyber threats.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ethical Hacking: Social Engineering.
Classic in the field of social engineering, providing a comprehensive overview of the techniques and tactics used by attackers. It is essential reading for anyone who wants to learn more about social engineering and how to protect themselves from it.
Provides a practical guide to social engineering, with a focus on the psychological aspects of the attack. It valuable resource for anyone who wants to learn how to identify and exploit human vulnerabilities.
Useful as a textbook or to provide additional depth and breadth to the concepts in this course
Provides a scientific understanding of the principles of influence, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of persuasion.
Consider reading this book to provide background knowledge to supplement this course.
Provides a comprehensive overview of the science of charisma, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of attraction.
Provides a scientific understanding of the principles of persuasion, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of influence.
Provides a comprehensive overview of the principles of marketing, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of persuasion.
Provides a scientific understanding of the principles of persuasion, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of influence.
Provides a comprehensive overview of the art of manipulation, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of influence.
Provides a comprehensive overview of the 48 laws of power, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of power.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Ethical Hacking: Social Engineering.
The Complete Ethical Hacker Certification Exam Prep Course
Most relevant
Certified Professional Ethical Hacking C)PEH Certification
Most relevant
Ethical Hacking: Understanding Ethical Hacking
Most relevant
Ethical Hacking: Exam Review and Tips
Most relevant
Penetration Testing and Ethical Hacking Complete Hands-on
Most relevant
Ethical Hacking: Network and Perimeter Hacking
Most relevant
Ethical Hacking: Vulnerability Analysis
Most relevant
Ethical Hacking: Hacking Wireless Networks
Most relevant
Try It: Ethical Hacking
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser