0845 450 6120

OSI Social Engineering: Attack and Defence

Social engineering has been widely used in society for building relationships and interacting with others for a long period of time. In the modern day, social engineering is the cyber criminal's most prolific weapon. The social engineer attacker targets everyone - from users of email, phones and SN sites to banks, businesses and OAP's.

A leading anti-virus company reports preventing 6.5 billion cyber-attacks in 2013. The UK is second, behind the US, in the highest volume of cyber-attacks and hacks against individuals, government and businesses. A cyber-attack could happen to anyone, even you.

This course will provide delegates a better understanding of social engineering, the common tricks and risks/vulnerabilities associated. After learning the "attack" side of social engineering, delegates will be equipped with the knowledge to play on "defence," to learn how to prevent and manage incidents that could also occur.

We don't currently have any courses listed for OSI Social Engineering: Attack and Defence , would you like to view all courses for Information & Cyber Security?

Learning Objectives

This course will provide delegates a better understanding of social engineering, the common tricks and risks/vulnerabilities associated. After learning the "attack" side of social engineering, delegates will be equipped with the knowledge to play on "defence," to learn how to prevent and manage incidents that could also occur.

Pre-Requisites

None - although a basic knowledge of how the Internet works and social networking sites would be an advantage.

This course would be useful for those in Law Enforcement, cyber investigation, HR and IT security and infrastructure.

Course Content

Day 1 - ATTACKS

  • The history, and origins of Social engineering
  • Common attacks and tricks
  • Port scanning
  • Social network scams
  • How we have all been victim of it
  • Phishing, Pharming, spear Phishing , Vishing,
  • Grooming ( paedophile and non sexual)
  • Infiltration and familiarity
  • Trojan horses, malware and botnets
  • Open source vulnerabilities

Day 2 - DEFENCE (prevention and detection)

  • Information Assurance
  • Prevention ( PEN testing, restrictions on use, etc)
  • Awareness
  • Passwords and encryption
  • Tracing and tracking the attacker
  • DNS , IP and header tracing
  • Firewalls and antivirus
  • Incident management
  • Physical and virtual security
  • OSINT tools to assist in blocking criminal IP's
  • Think like the social engineer ( and therefore beat them)
One Month
Two Months
Three Months
More than Three Months
PRINCE2 Foundation & Practitioner
MSP Foundation & Practitioner
APMP Certificate
ITIL Foundation
Scrum in One Day
Certified ScrumMaster
ISTQB Software Test Foundation
Microsoft Project
BCS Business Analysis Practice
Other - Please Specify Below

Our Customers Include