We may earn an affiliate commission when you visit our partners.
Alexander Tushinsky

This course will teach you the social engineering skills needed for EC-Council’s Certified Ethical Hacker certification.

Read more

This course will teach you the social engineering skills needed for EC-Council’s Certified Ethical Hacker certification.

The EC-Council’s Certified Ethical Hacker certification serves as a starting point for many ethical hackers and teaches you the basics of penetration testing. In this course, Ethical Hacking: Social Engineering, you’ll learn social engineering tactics used by hackers. First, you’ll learn the various types of attack vectors such as phishing and impersonation. Next, you’ll discover aspects of physical security, and rogue websites, and Finally, you’ll learn how to guard against social engineering attacks. When you’re finished with this course, you’ll have the skills and knowledge of Social Engineering needed for EC-Council's Certified Ethical Hacker certification.

Enroll now

What's inside

Syllabus

Course Overview
Social Engineering
Consequences and Countermeasures
Course Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches skills, knowledge, and tools that are highly relevant to industry
Teaches skills, knowledge, and/or tools that are useful for personal growth and development
Taught by Alexander Tushinsky, who is recognized for their work in EC-Council
Develops Social Engineering and its techniques, which are core skills for ethical hacking
Examines social engineering, which is highly relevant to ethical hacking
Requires students to take EC-Council's Certified Ethical Hacker certification as a prerequisite

Save this course

Save Ethical Hacking: Social Engineering to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Ethical Hacking: Social Engineering with these activities:
Network security fundamentals tutorial
Following this tutorial will help solidify the basic concepts of network security, which will be important for setting a strong foundation for the rest of the course.
Browse courses on network security
Show steps
  • Find a tutorial on network security fundamentals.
  • Watch the tutorial and take notes.
  • Test your understanding by completing the exercises provided in the tutorial.
Watch a tutorial on how to create a honeypot
This activity will help you learn how to set up a honeypot to protect your network from attackers.
Browse courses on Security
Show steps
  • Find a tutorial on how to create a honeypot
  • Watch the tutorial and follow the instructions
  • Test your honeypot to make sure it is working properly
Organize your notes and materials
Keeping materials organized allows for easier recall at a later date.
Show steps
  • Gather all of your notes and materials for this course
  • Organize your materials into a system that makes sense to you
  • Review your materials regularly to reinforce your learning
Nine other activities
Expand to see all activities and additional details
Show all 12 activities
Form a study group
Peer sessions and study groups can improve student outcomes.
Browse courses on Ethical Hacking
Show steps
  • Find other students who are interested in forming a study group
  • Decide on a meeting time and location
  • Set goals for the group
  • Meet regularly to discuss course material, work on projects, and prepare for exams
Phishing simulation exercises
Taking part in these exercises will enhance your ability to identify phishing emails, which will be critical for protecting yourself and your organization from cyberattacks.
Browse courses on Phishing
Show steps
  • Find a phishing simulation platform.
  • Create an account and complete the training exercises.
  • Review your results and identify areas for improvement.
Read 'Beyond the Cuckoo's Nest
Gives an insight into the weaknesses of humans and how to bypass some of these defenses in an ethical way.
Show steps
  • Obtain the book through your preferred source
  • Read 20 pages per day
  • Make notes on tactics you find
Practice phishing emails
This activity will allow you to improve your skills at spotting phishing emails and avoiding them.
Browse courses on Phishing
Show steps
  • Find a list of phishing emails
  • Go through the list and identify the common characteristics of phishing emails
  • Practice spotting phishing emails in your own inbox
Ethical hacking study group
Joining a study group will provide a supportive environment for learning and practicing ethical hacking techniques, which will enhance your understanding and skills.
Browse courses on Ethical Hacking
Show steps
  • Find a peer group who are also taking an ethical hacking certification course.
  • Meet regularly to discuss the course material and practice ethical hacking techniques.
  • Help each other prepare for the certification exam.
Design a social engineering campaign poster
The purpose of this exercise is to improve creativity and to better understand how to design an attention grabbing page that still passes as professional looking.
Browse courses on Social Engineering
Show steps
  • Decide on a target persona
  • Brainstorm ways to appeal to the target persona
  • Design the poster
  • Get feedback on the poster from peers
Contribute to an open-source social engineering tool
This activity will provide practical experience and improved knowledge in using advanced techniques and tools.
Browse courses on Social Engineering
Show steps
  • Find an open-source social engineering tool
  • Read the documentation for the tool
  • Make a small contribution to the tool
  • Submit a pull request to the tool's repository
Social engineering workshop
Attending this workshop will provide hands-on experience in identifying and defending against social engineering attacks, which will be invaluable for your role as an ethical hacker.
Browse courses on Social Engineering
Show steps
  • Find a social engineering workshop.
  • Register for the workshop.
  • Attend the workshop and actively participate in the exercises.
Volunteer at a local security conference
This experience will provide you opportunities for observing professionals and gaining new experiences.
Browse courses on Ethical Hacking
Show steps
  • Find a local security conference
  • Contact the conference organizers and ask if they need volunteers
  • Volunteer at the conference
  • Meet and network with other security professionals
  • Learn about the latest security trends and technologies

Career center

Learners who complete Ethical Hacking: Social Engineering will develop knowledge and skills that may be useful to these careers:
Penetration Tester
Penetration Testers are ethical hackers who are hired to identify and exploit vulnerabilities in an organization's security systems. They work with clients to assess their security posture and to develop and implement security measures. The Ethical Hacking: Social Engineering course can be a valuable resource for Penetration Testers, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Penetration Testers to be more effective in their roles and to better protect their clients from cyber threats.
Security Consultant
Security Consultants are professionals who help organizations improve their security posture by identifying and mitigating vulnerabilities. They work with clients to assess their security needs, develop security plans, and implement security measures. The Ethical Hacking: Social Engineering course can be a valuable resource for Security Consultants, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Security Consultants to be more effective in their roles and to better protect their clients from cyber threats.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for monitoring and analyzing an organization's security systems and data for threats. They work with other IT professionals to develop and implement security policies and procedures, and they respond to security incidents. The Ethical Hacking: Social Engineering course can be a valuable resource for Cybersecurity Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Cybersecurity Analysts to be more effective in their roles and to better protect their organizations from cyber threats.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining an organization's security systems. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and respond to security incidents. The Ethical Hacking: Social Engineering course can be a valuable resource for Security Engineers, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Security Engineers to be more effective in their roles and to better protect their organizations from cyber threats.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and respond to security incidents. The Ethical Hacking: Social Engineering course can be a valuable resource for Information Security Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Information Security Analysts to be more effective in their roles and to better protect their organizations from cyber threats.
Malware Analyst
Malware Analysts are responsible for identifying, analyzing, and mitigating malware. They work with other security professionals to develop and implement security measures to protect organizations from malware attacks. The Ethical Hacking: Social Engineering course can be a valuable resource for Malware Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Malware Analysts to be more effective in their roles and to better protect their organizations from cyber threats.
Vulnerability Manager
Vulnerability Managers are responsible for identifying, assessing, and mitigating vulnerabilities in an organization's information systems and data. They work with other security professionals to develop and implement security measures to protect the organization from cyber threats. The Ethical Hacking: Social Engineering course can be a valuable resource for Vulnerability Managers, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Vulnerability Managers to be more effective in their roles and to better protect their organizations from cyber threats.
Forensic Analyst
Forensic Analysts are responsible for investigating and analyzing computer systems and data for evidence of criminal activity. They work with law enforcement and other investigators to collect and analyze evidence, and they testify in court about their findings. The Ethical Hacking: Social Engineering course can be a valuable resource for Forensic Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Forensic Analysts to be more effective in their roles and to better investigate and prevent cybercrimes.
Security Auditor
Security Auditors are responsible for assessing an organization's security posture and compliance with security regulations. They work with other IT professionals to develop and implement security measures to protect the organization from cyber threats. The Ethical Hacking: Social Engineering course can be a valuable resource for Security Auditors, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Security Auditors to be more effective in their roles and to better protect their organizations from cyber threats.
Risk Analyst
Risk Analysts are responsible for identifying, assessing, and mitigating risks to an organization's information systems and data. They work with other security professionals to develop and implement security measures to protect the organization from cyber threats. The Ethical Hacking: Social Engineering course can be a valuable resource for Risk Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Risk Analysts to be more effective in their roles and to better protect their organizations from cyber threats.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining an organization's network security systems. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and respond to security incidents. The Ethical Hacking: Social Engineering course can be a valuable resource for Network Security Engineers, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Network Security Engineers to be more effective in their roles and to better protect their organizations from cyber threats.
Cyber Threat Intelligence Analyst
Cyber Threat Intelligence Analysts are responsible for collecting and analyzing information about cyber threats. They work with other security professionals to develop and implement security measures to protect organizations from cyber attacks. The Ethical Hacking: Social Engineering course can be a valuable resource for Cyber Threat Intelligence Analysts, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Cyber Threat Intelligence Analysts to be more effective in their roles and to better protect their organizations from cyber threats.
Incident Responder
Incident Responders are responsible for responding to and mitigating security incidents. They work with other IT professionals to identify and contain the threat, and they restore the organization's systems and data to a safe state. The Ethical Hacking: Social Engineering course can be a valuable resource for Incident Responders, as it provides them with the skills and knowledge needed to identify and exploit social engineering vulnerabilities. This course can help Incident Responders to be more effective in their roles and to better protect their organizations from cyber threats.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ethical Hacking: Social Engineering.
Classic in the field of social engineering, providing a comprehensive overview of the techniques and tactics used by attackers. It is essential reading for anyone who wants to learn more about social engineering and how to protect themselves from it.
Provides a practical guide to social engineering, with a focus on the psychological aspects of the attack. It valuable resource for anyone who wants to learn how to identify and exploit human vulnerabilities.
Provides a scientific understanding of the principles of influence, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of persuasion.
Consider reading this book to provide background knowledge to supplement this course.
Provides a comprehensive overview of the science of charisma, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of attraction.
Provides a scientific understanding of the principles of persuasion, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of influence.
Provides a comprehensive overview of the principles of marketing, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of persuasion.
Provides a scientific understanding of the principles of persuasion, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of influence.
Provides a comprehensive overview of the art of manipulation, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of influence.
Provides a comprehensive overview of the 48 laws of power, which can be used to improve social engineering techniques. It valuable resource for anyone who wants to learn more about the psychology of power.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Ethical Hacking: Social Engineering.
The Complete Ethical Hacker Certification Exam Prep Course
Most relevant
Certified Professional Ethical Hacking C)PEH Certification
Most relevant
Ethical Hacking: Understanding Ethical Hacking
Most relevant
Ethical Hacking: Exam Review and Tips
Most relevant
Penetration Testing and Ethical Hacking Complete Hands-on
Most relevant
Ethical Hacking: Network and Perimeter Hacking
Most relevant
Ethical Hacking: Vulnerability Analysis
Most relevant
Ethical Hacking: Hacking Wireless Networks
Most relevant
Try It: Ethical Hacking
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser