Course DescriptionSocial engineering in the realm of IT and computers is any attempt to circumvent administrative, technical, or physical controls by conning or manipulating humans. The objective of social engineering is to convince people to give up access to some data, or system, or facility that they shouldn't. It is a method of attack, an exploit, that focuses on people rather than technology. In this course, you will learn about the various forms of social engineering. You will explore concepts of social engineering attacks, including over the phone, email phishing, and reverse social engineering.
- A solid understanding of TCP/IP protocols and how they work
- A strong foundation in basic networking concepts
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics like CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.