Social Engineering Training Course
Social engineering involves the exploitation of psychological manipulation to extract sensitive information. Because it leverages human error, it is often more difficult to anticipate and mitigate than malware-driven intrusions.
This instructor-led, live training (available online or onsite) is designed for information analysts who want to understand the methods and processes behind social engineering in order to safeguard their organization's confidential data.
Upon completing this training, participants will be able to:
- Configure the necessary development environment to begin creating custom malware.
- Install backdoors in legitimate web applications without detection.
- Disguise malicious files to appear as normal file types.
- Apply social engineering tactics to redirect targets to fraudulent websites.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation within a live-lab environment.
Course Customization Options
- To request a customized version of this course, please contact us to arrange details.
Course Outline
Introduction
What is Social Engineering
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Information Gathering
- Domain information
- Networking accounts
- Maltego overview
Preparing the Penetration Testing Laboratory
- Installing and configuring a virtual machine
- Installing and configuring Maltego (information gathering tool)
Generating Evil Files
- Installing and configuring BeeLogger
- Implementing command lines scripts to access an operating system that uses bash
- Creating an advanced backdoor
- Creating a custom remote keylogger
- Logging saved passwords
- Executing payload
- Reporting payload
Delivery Options
- Initiating an SMTP server
- Spoofing emails
- Replicating any legitimate login page
- Directing targets to access an evil URL
Social Engineering Prevention
- Recognizing spoofed emails
- Protecting against browser exploits
- Detecting malware manually or using a sandbox
Summary and Conclusion
Requirements
- Experience with information systems
Audience
- Information system analysts
Open Training Courses require 5+ participants.
Social Engineering Training Course - Booking
Social Engineering Training Course - Enquiry
Social Engineering - Consultancy Enquiry
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.
Otilia Pasareti - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Taiwan (online or onsite) targets cybersecurity professionals at the beginner level who aim to master leveraging AI to enhance their threat identification and reaction capabilities.
Upon completion of this training, participants will be able to:
- Comprehend the application of AI in cybersecurity.
- Deploy AI algorithms for threat identification.
- Automate incident reaction using AI tools.
- Integrate AI into current cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Taiwan (online or onsite) is designed for intermediate to advanced cybersecurity professionals who wish to enhance their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customize AI models for specific cybersecurity challenges.
- Develop automation workflows for threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Taiwan (online or onsite) is designed for intermediate-level IT security professionals looking to develop skills in security monitoring, analysis, and response.
Upon completing this training, participants will be able to:
- Grasp the Blue Team's role within cybersecurity operations.
- Utilize SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents effectively.
- Conduct network traffic analysis and gather threat intelligence.
- Implement best practices in Security Operations Center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves discovering security vulnerabilities in software, websites, or systems and responsibly reporting them to receive rewards or recognition.
This instructor-led, live training (available online or onsite) is designed for beginner-level security researchers, developers, and IT professionals who want to learn the fundamentals of ethical bug hunting and how to engage with bug bounty programs.
By the end of this training, participants will be able to:
- Grasp the core concepts of vulnerability discovery and bug bounty programs.
- Utilize essential tools like Burp Suite and browser developer tools for application testing.
- Identify common web security flaws, such as XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Format of the Course
- Interactive lecture and discussion.
- Hands-on use of bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training for this course based on your organization's applications or testing needs, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation delves deeply into high-impact vulnerabilities, automation frameworks, reconnaissance methods, and the tooling strategies employed by top-tier bug bounty hunters.
This instructor-led, live training (available online or onsite) targets intermediate to advanced security researchers, penetration testers, and bug bounty hunters who aim to streamline their workflows, scale their reconnaissance efforts, and uncover complex vulnerabilities across multiple targets.
Upon completing this training, participants will be capable of:
- Automating reconnaissance and scanning processes for multiple targets.
- Utilizing state-of-the-art tools and scripts for automation in bug bounty programs.
- Identifying complex, logic-based vulnerabilities that go beyond standard scanning capabilities.
- Developing custom workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Practical application of advanced tools and scripting for automation.
- Guided labs focusing on real-world bounty workflows and advanced attack chains.
Course Customization Options
- For a customized version of this course tailored to your specific bounty targets, automation requirements, or internal security challenges, please contact us to arrange.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Taiwan (online or onsite) is designed for beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is specifically designed to train Cyber Crime and Fraud Investigators, equipping them with skills in electronic discovery and advanced investigation methodologies. This course is indispensable for professionals who encounter digital evidence during the course of their investigative work.
This Certified Digital Forensics Examiner training imparts the structured methodology required for conducting computer forensic examinations. Participants will learn to apply forensically sound investigative techniques to evaluate crime scenes, collect and document pertinent information, interview relevant personnel, maintain a strict chain of custody, and produce comprehensive findings reports.
The Certified Digital Forensics Examiner program benefits organizations, individuals, government entities, and law enforcement agencies seeking to pursue litigation, establish proof of guilt, or take corrective action based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler program delivers a systematic methodology for managing and responding to cybersecurity incidents with both efficiency and effectiveness.
This instructor-led training, available in online or on-site formats, is designed for intermediate IT security professionals seeking to cultivate the tactical expertise required to plan, classify, contain, and manage security incidents.
Upon completion of this training, participants will be equipped to:
- Comprehend the incident response lifecycle and its distinct phases.
- Implement procedures for incident detection, classification, and notification.
- Apply effective strategies for containment, eradication, and recovery.
- Create post-incident reports and continuous improvement plans.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated scenarios.
- Guided exercises targeting detection, containment, and response workflows.
Customization Options
- For customized training tailored to your organization's specific incident response procedures or tools, please contact us to arrange.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Taiwan (online or onsite) is designed for intermediate-level cybersecurity professionals looking to implement CTEM within their organizations.
By the end of this training, participants will be able to:
- Grasp the principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilize tools and technologies for continuous threat management.
- Develop strategies to validate and improve security measures continuously.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores the management of incident response teams. Given the frequent and complex nature of modern cyber attacks, incident response has become a vital function for organizations. The role of the first responder is crucial in this context.
Incident response serves as the final line of defense. Effectively detecting and responding to incidents demands robust management processes. Furthermore, leading an incident response team requires specialized skills and expertise.
Cyber Threat Intelligence
35 HoursThis instructor-led live training, available online or on-site, targets advanced cyber security professionals seeking to master Cyber Threat Intelligence and acquire the skills necessary to effectively manage and mitigate cyber threats.
Upon completing this training, participants will be able to:
- Grasp the core fundamentals of Cyber Threat Intelligence (CTI).
- Assess the current cyber threat landscape.
- Gather and process intelligence data.
- Execute advanced threat analysis.
- Utilize Threat Intelligence Platforms (TIPs) and automate threat intelligence workflows.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Taiwan (online or onsite) covers the different aspects of enterprise security, from AI to database security. It also includes coverage of the latest tools, processes and mindset needed to protect from attacks.
DeepSeek for Cybersecurity and Threat Detection
14 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to leverage DeepSeek for advanced threat detection and automation.
By the end of this training, participants will be able to:
- Utilize DeepSeek AI for real-time threat detection and analysis.
- Implement AI-driven anomaly detection techniques.
- Automate security monitoring and response using DeepSeek.
- Integrate DeepSeek into existing cybersecurity frameworks.
Ethical Hacker
35 HoursThis course immerses students in an interactive environment, demonstrating how to scan, test, exploit, and secure their own systems. The lab-intensive setting provides each participant with in-depth knowledge and practical experience with current essential security technologies. Students will start by understanding how perimeter defenses function, then proceed to scan and attack their own networks without harming any real infrastructure. The curriculum covers how intruders escalate privileges and the steps necessary to secure a system. Additionally, students will learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. Upon completing this intensive 5-day class, students will possess hands-on understanding and experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
The course is ideal for those working in positions such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Directors/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker certification is a highly regarded cybersecurity credential recognized globally.
This program combines comprehensive instruction with practical application to prepare students for both the CEH certification exam and the CEH Practical Exam. Candidates who successfully pass both examinations will earn the CEH Master credential alongside their CEH certification.
Students have the option to enhance their package by choosing either the CPENT or the CHFI course.
Each student will receive training for either the Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course through EC-Council’s online, self-paced, streaming video program.
CPENT (Pen-test):
Instructs students on how to apply the concepts and tools learned in the CEH program to a penetration testing methodology within a live cyber range environment.
CHFI (Computer Forensics):
Teaches a methodological approach to computer forensics, covering areas such as searching and seizing, chain-of-custody protocols, data acquisition, preservation, analysis, and reporting of digital evidence.
Course Description
CEH offers a deep understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It reveals how hackers think and operate maliciously, empowering you to better structure your security infrastructure and defend against future threats. By understanding system weaknesses and vulnerabilities, organizations can strengthen their security controls to minimize incident risk.
CEH is designed to integrate a hands-on environment and systematic process across each ethical hacking domain and methodology. This provides the opportunity to demonstrate the knowledge and skills required to achieve the CEH credential. You will encounter a completely different perspective on the responsibilities and measures necessary to maintain security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. This exam is designed to demonstrate that you can execute the principles taught in the CEH course. The practical exam requires you to apply ethical hacking techniques, such as identifying threat vectors, network scanning, operating system detection, vulnerability analysis, system hacking, and more.
The CEH Practical exam does not rely on simulations. Instead, you will challenge a live range designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after obtaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical Exam will earn you the additional CEH Master certification.
About the Certified Ethical Hacker Practical
To prove your proficiency in ethical hacking, we test your abilities through real-world challenges in a realistic environment. Using labs and tools, you will complete specific ethical hacking challenges within a set time limit, simulating the pressures of the real world.
The EC-Council CEH (Practical) exam features a complex network that replicates a large organization’s real-life infrastructure, including various network systems (such as DMZ, Firewalls, etc.). You must apply your ethical hacking skills to discover and exploit real-time vulnerabilities while auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses entirely on penetration testing. It teaches you to operate within an enterprise network environment that must be attacked, exploited, evaded, and defended. If you are accustomed only to flat networks, CPENT’s live practice range will elevate your skills. You will learn to pen test IoT and OT systems, write custom exploits, build tools, conduct advanced binary exploitation, double pivot to access hidden networks, and customize scripts and exploits to penetrate the innermost segments of the network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. This comprehensive course covers major forensic investigation scenarios, enabling students to gain necessary hands-on experience with various forensic investigation techniques and standard forensic tools required to successfully conduct a computer forensic investigation.