Social Engineering Training: Deceptions and Defences

Level: Intermediate
Rating: 4.9/5 4.89/5 Based on 79 Reviews

In this Social Engineering course you gain the knowledge to defend against social engineering deceptions that threaten organisational security. You will gain the social engineering awareness to learn what is a social engineering attack. You will learn to prevent data breaches by learning the motivations and methods used by social engineers to access sensitive data and exploit organisational vulnerabilities. Gain the skills to implement procedures to defeat deceptions, and mitigate personnel vulnerabilities with this social engineering awareness course.

Key Features of this Social Engineering Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Defend against social engineering deceptions that threaten organisational security
  • Plan and evaluate security assessments for human weaknesses
  • Promote vigilance and implement procedures to defeat deceptions
  • Mitigate personnel vulnerabilities with security awareness
  • Measure your organization’s preparedness for attacks

Certifications/Credits:

CompTIA

Choose the Training Solution That Best Fits Your Individual Needs or Organisational Goals

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 3-day instructor-led training course
  • One-on-one after course instructor coaching
  • Earn 17 CompTIA CEUs
  • Pay later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard £1695

RESERVE SEAT

PRODUCT #2012

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organisation
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More on Training with Learning Tree Training Vouchers!

Our flexible, easy-to-redeem training vouchers are available to any employee within your organisation. For details, please call 0800 282 353 or chat live.

In Class & Live, Online Training

  • AFTERNOON START: Attend these live courses online via Anyware

    29 - 31 May ( 3 Days)
    2:00 PM - 9:30 PM BST
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • 20 - 22 Nov ( 3 Days)
    2:00 PM - 9:30 PM GMT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Important Social Engineering Course Information

  • Course Description

    In this course, you gain the skills to defend against social engineering attacks that threaten organisational security. You learn the technical and psychological methods of manipulation, impersonation and persuasion used by social engineers. Further, this course incorporates hands-on activities designed to understand the motivations and methods used by social engineers, to better protect your organisation and prevent data breaches.

Social Engineering Course Outline

  • Introduction to Social Engineering

    Evaluating the organisational risks

    • Assessing social engineering threats
    • Analysing classic case studies

    Thinking like a social engineer

    • Considering attack frameworks
    • Reviewing the methods of manipulation
    • Examining legal issues and social concerns
  • Gathering Information and Intelligence

    Identifying information sources

    • Gathering information passively and actively
    • Leveraging social media
    • Exploiting Google hacking

    Collecting target information

    • Ripping information from sites with theHarvester
    • Dumpster diving for secrets and intelligence
    • Profiling users for weaknesses

    Minimising information leaks

    • Securing information leaks
    • Implementing secure disposal policies
    • Pinpointing reconnaissance probes
  • Identifying Communication Models

    Profiling an information architecture

    • Implementing the Berlo communication model
    • Source
    • Message
    • Channel
    • Receiver
    • Determining communication weaknesses

    Addressing communication flaws

    • Verifying the source
    • Securing the information channel
  • Assessing Elicitation Methods

    Drawing out information

    • Soliciting information
    • Interview techniques
    • Identifying elicitation tactics and goals

    Mitigating information leaks

    • Maintaining situational awareness
    • Implementing scripted responses
  • Gaining Physical Access

    Circumventing physical security

    • Identifying weak types of locks
    • Bypassing electronic access controls

    Securing the environment

    • Implementing high security locks
    • Preventing lock bumping
  • Impersonating Authorised Personnel

    Gaining access with a disguise

    • Identifying spoofing techniques
    • Discovering change blindness deception
    • Assessing Internet impersonation techniques

    Defending against impersonation and forgery

    • Implementing techniques to verify identity
    • Avoiding skimmers and hidden technology threats
  • Employing Psychology for Persuasion

    Examining human weaknesses

    • Leveraging Cialdini’s motivation factors
    • Identifying mindlessness dangers
    • Exploring commitment and consistency vulnerability

    Compelling behaviour

    • Exploiting social proofing
    • Taking advantage of implied authority
    • Demanding action with "quid pro quo"

    Bolstering resistance to persuasion

    • Adhering to policy and rules
    • Recognising risky situations
    • Learning to interpret and then recognise
  • Implementing Management Countermeasures

    Assessing social engineering vulnerabilities

    • Conducting a penetration test
    • Creating a scope of work
    • Mitigating legal issues and embarrassment

    Creating comprehensive policies

    • Establishing verification policies
    • Regulating the use of social networks
    • Delivering effective security awareness training

Team Training

Social Engineering Training FAQs

  • What is social engineering?

    Social engineering is what it is called when hackers manipulate people to give up confidential information. There are many forms of social engineering.

  • What is a social engineering attack?

    It is an attack that relies heavily on human interaction and uses manipulation to have people break normal security procedures and practises.

  • Can I learn social engineering awareness online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 0800 282 353
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition fee!
  • No advance payment required for most products.
  • Tuition fee can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

Alexandria, VA / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français