Social Engineering Training Course
Social engineering involves extracting sensitive data via psychological manipulation. Because it exploits human error, it is often more unpredictable and difficult to prevent than malware-driven attacks.
This instructor-led live training, available online or onsite, is designed for information analysts seeking to master social engineering techniques and processes to safeguard corporate data.
Upon completion of this course, participants will be able to:
- Configure the necessary development environment to build custom malware.
- Insert backdoors into legitimate web applications without detection.
- Disguise malicious files as standard file types.
- Apply social engineering tactics to direct targets to fraudulent websites.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical application.
- Hands-on implementation within a live-lab environment.
Customization Options
- To request tailored training for this course, please contact us to arrange your schedule.
Course Outline
Introduction
What is Social Engineering
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Information Gathering
- Domain information
- Networking accounts
- Maltego overview
Preparing the Penetration Testing Laboratory
- Installing and configuring a virtual machine
- Installing and configuring Maltego (information gathering tool)
Generating Evil Files
- Installing and configuring BeeLogger
- Implementing command lines scripts to access an operating system that uses bash
- Creating an advanced backdoor
- Creating a custom remote keylogger
- Logging saved passwords
- Executing payload
- Reporting payload
Delivery Options
- Initiating an SMTP server
- Spoofing emails
- Replicating any legitimate login page
- Directing targets to access an evil URL
Social Engineering Prevention
- Recognizing spoofed emails
- Protecting against browser exploits
- Detecting malware manually or using a sandbox
Summary and Conclusion
Requirements
- Experience with information systems
Audience
- Information system analysts
Open Training Courses require 5+ participants.
Social Engineering Training Course - Booking
Social Engineering Training Course - Enquiry
Social Engineering - Consultancy Enquiry
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.
Otilia Pasareti - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Brazil (online or onsite) is designed for beginner-level cybersecurity professionals seeking to leverage AI to enhance their threat detection and response capabilities.
Upon completion of this training, participants will be able to:
- Comprehend the role of AI in cybersecurity.
- Deploy AI algorithms for identifying threats.
- Automate incident response processes using AI tools.
- Incorporate AI into existing cybersecurity frameworks.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led live training in Brazil (online or onsite) is designed for intermediate to advanced cybersecurity professionals aiming to enhance their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Deploy advanced AI algorithms for real-time threat detection.
- Customize AI models to address specific cybersecurity challenges.
- Create automation workflows for effective threat response.
- Protect AI-driven security tools from adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Brazil (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting is the practice of identifying security vulnerabilities in software, websites, or systems and responsibly reporting them for rewards or recognition.
This instructor-led, live training (online or onsite) is aimed at beginner-level security researchers, developers, and IT professionals who wish to learn the fundamentals of ethical bug hunting and how to participate in bug bounty programs.
By the end of this training, participants will be able to:
- Understand the core concepts of vulnerability discovery and bug bounty programs.
- Use key tools like Burp Suite and browser dev tools for testing applications.
- Identify common web security flaws such as XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Format of the Course
- Interactive lecture and discussion.
- Hands-on use of bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training for this course based on your organization's applications or testing needs, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation offers an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance strategies, and the tooling tactics employed by top-tier bug bounty hunters.
This instructor-led live training (available online or onsite) is designed for security researchers, penetration testers, and bug bounty hunters at the intermediate to advanced level who aim to streamline their workflows, expand their reconnaissance capabilities, and identify complex vulnerabilities across multiple targets.
Upon completing this training, participants will be equipped to:
- Automate reconnaissance and scanning processes for numerous targets.
- Utilize state-of-the-art tools and scripts for bounty automation.
- Identify complex, logic-based vulnerabilities that go beyond standard scanning capabilities.
- Develop custom workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Hands-on practice with advanced tools and scripting for automation.
- Guided labs focusing on real-world bounty workflows and advanced attack chains.
Customization Options
- For tailored training based on your specific bounty targets, automation requirements, or internal security challenges, please reach out to us to arrange a customized session.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Brazil (online or onsite) is designed for beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is designed to train Cyber Crime and Fraud Investigators, equipping students with skills in electronic discovery and advanced investigation techniques. This course is essential for anyone who encounters digital evidence during an investigation.
The Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.
The Certified Digital Forensics Examiner course benefits organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler program delivers a systematic methodology for managing and responding to cybersecurity incidents with precision and efficiency.
Delivered through live, instructor-led sessions (available online or onsite), this course targets intermediate IT security professionals seeking to acquire the tactical expertise required to plan, classify, contain, and manage security breaches.
Upon completion of this training, participants will be capable of:
- Grasping the incident response lifecycle and its distinct phases.
- Implementing procedures for incident detection, classification, and notification.
- Applying effective strategies for containment, eradication, and recovery.
- Creating post-incident reports and continuous improvement plans.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated environments.
- Guided exercises concentrating on detection, containment, and response workflows.
Customization Options
- To arrange customized training tailored to your organization's specific incident response procedures or tools, please reach out to us.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Brazil (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to implement CTEM in their organizations.
By the end of this training, participants will be able to:
- Understand the principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilize tools and technologies for continuous threat management.
- Develop strategies to validate and improve security measures continuously.
Cyber Emergency Response Team (CERT)
7 HoursThis course discusses how to manage an incident response team. how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations.
Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Brazil (online or in-person) is designed for advanced-level cybersecurity professionals seeking to understand Cyber Threat Intelligence and develop skills to effectively manage and mitigate cyber threats.
Upon completion of this training, participants will be able to:
- Grasp the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Conduct advanced threat analysis.
- Utilize Threat Intelligence Platforms (TIPs) and automate threat intelligence workflows.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Brazil (online or onsite) explores various facets of enterprise security, ranging from AI to database protection. The curriculum also covers the latest tools, processes, and mindsets required to effectively defend against attacks.
Ethical Hacker
35 HoursThis course immerses participants in an interactive environment, demonstrating how to scan, test, compromise, and secure their own systems. The hands-on lab approach provides each student with deep knowledge and practical experience using today's essential security tools. Participants start by understanding how perimeter defenses operate, then proceed to scan and attack their own networks in a safe, controlled setting where no real infrastructure is harmed. Learners also explore how intruders escalate privileges and the steps required to fortify systems. Additionally, the curriculum covers Intrusion Detection, Policy Development, Social Engineering, DDoS Attacks, Buffer Overflows, and Malware Creation. Upon completing this intensive five-day program, students will possess a practical, hands-on understanding of ethical hacking.
The primary objectives of the Ethical Hacking Training are to:
- Establish and govern baseline standards for certifying professional information security specialists in ethical hacking techniques.
- Assure the public that credentialed professionals meet or exceed these established standards.
- Reinforce ethical hacking as a distinct, self-regulating profession.
Target Audience:
This course is ideal for professionals in roles such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Directors/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
Certified Lead Ethical Hacker
35 HoursWhy should you attend?
The Certified Lead Ethical Hacker training course empowers you to develop the necessary expertise to carry out information system penetration tests by applying recognized principles, procedures, and penetration testing techniques. This allows you to identify potential threats within a computer network. Throughout this training, you will acquire the knowledge and skills required to manage a penetration testing project or team, as well as to plan and execute both internal and external pentests, in compliance with various standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Additionally, you will gain a comprehensive understanding of how to draft reports and propose countermeasures. Through practical exercises, you will master penetration testing techniques and acquire the skills needed to manage a pentest team, as well as handle customer communication and conflict resolution.
The Certified Lead Ethical Hacking training course provides a technical perspective on information security through ethical hacking, utilizing common techniques such as information gathering and vulnerability detection, both inside and outside a business network.
The training is also aligned with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
After mastering the necessary knowledge and skills in ethical hacking, you can take the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. By holding a PECB Lead Ethical Hacker certificate, you will demonstrate that you have acquired the practical skills for performing and managing penetration tests according to best practices.
Who should attend?
- Individuals interested in IT Security, particularly in Ethical Hacking, who wish to learn more about the topic or begin a process of professional reorientation.
- Information security officers and professionals seeking to master ethical hacking and penetration testing techniques.
- Managers or consultants wishing to learn how to control the penetration testing process.
- Auditors wishing to perform and conduct professional penetration tests.
- Persons responsible for maintaining the security of information systems within an organization.
- Technical experts who want to learn how to prepare a pentest.
- Cybersecurity professionals and information security team members.
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker credential is a highly coveted cybersecurity certification globally.
This program blends instruction with practical application to prepare students for both the CEH certification exam and the CEH Practical Exam. Those who successfully pass both assessments earn the CEH Master credential alongside their CEH certification.
Participants have the option to enhance their package by including either the CPENT or the CHFI course.
Training for either the Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course is delivered to each student through EC-Council’s online, self-paced streaming video program.
CPENT (Pen-test):
Instructs students on applying the concepts and tools from the CEH program to a pen-test methodology within a live cyber range.
CHFI (Computer Forensics):
Teaches a methodological approach to computer forensics, covering searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
Course Description
CEH provides a deep understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It helps you understand how hackers think and act maliciously, positioning you to better secure your infrastructure and defend against future attacks. By understanding system weaknesses and vulnerabilities, organizations can strengthen their security controls to minimize incident risk.
CEH was designed to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to prove the knowledge and skills required to achieve the CEH credential. You will be exposed to a completely different perspective on the responsibilities and measures needed to maintain security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. The CEH Practical Exam was designed to allow students to demonstrate their ability to execute the principles taught in the CEH course. The practical exam requires you to show the application of ethical hacking techniques, such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical does not involve simulations. Instead, you will challenge a live range designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after attaining the Certified Ethical Hacker (CEH) certification. Successfully passing both the CEH exam and the CEH Practical earns you the additional certification of CEH Master.
About the Certified Ethical Hacker Practical
To prove your skills in ethical hacking, we test your abilities with real-world challenges in a real-world environment. This involves using labs and tools that require you to complete specific ethical hacking challenges within a time limit, just as you would in real life.
The EC-Council CEH (Practical) exam consists of a complex network that replicates a large organization’s real-life network, including various network systems (such as DMZ, Firewalls, etc.). You must apply your ethical hacking skills to discover and exploit real-time vulnerabilities while also auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses entirely on pen-testing. It teaches you how to operate in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only worked in flat networks, CPENT’s live practice range will help you take your skills to the next level by teaching you to pen-test IoT systems, OT systems, write your own exploits, build your own tools, conduct advanced binary exploitation, double pivot to access hidden networks, and customize scripts and exploits to penetrate the innermost segments of the network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to gain necessary hands-on experience with various forensic investigation techniques and standard forensic tools required to successfully carry out a computer forensic investigation.