Course Outline
Introduction
What is Social Engineering
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Information Gathering
- Domain information
- Networking accounts
- Maltego overview
Preparing the Penetration Testing Laboratory
- Installing and configuring a virtual machine
- Installing and configuring Maltego (information gathering tool)
Generating Evil Files
- Installing and configuring BeeLogger
- Implementing command lines scripts to access an operating system that uses bash
- Creating an advanced backdoor
- Creating a custom remote keylogger
- Logging saved passwords
- Executing payload
- Reporting payload
Delivery Options
- Initiating an SMTP server
- Spoofing emails
- Replicating any legitimate login page
- Directing targets to access an evil URL
Social Engineering Prevention
- Recognizing spoofed emails
- Protecting against browser exploits
- Detecting malware manually or using a sandbox
Summary and Conclusion
Requirements
- Experience with information systems
Audience
- Information system analysts
Testimonials (6)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us
Raheal Akhtar - Dubai Government Human Resources Department
Course - Certified Ethical Hacker
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
A wide range of knowledge of the lecturer.