From the course: Introduction to Pen Testing for Cybersecurity Professionals
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Hacking the human
From the course: Introduction to Pen Testing for Cybersecurity Professionals
Hacking the human
- [Instructor] There's a potential to break into any system no matter how secure or what logical controls are in place. That's because when a malicious actor attempts to break into a building, or get past the firewalls, the goal is always the same, get into the system using any means possible. Logical network defenses, security appliances, and anti-malware protection gets stronger every day. Over time, industry has strengthened our defenses and as a result, malicious actors take advantage of a softer target, the people in an organization, including employees, contractors, and customers by using a social engineering attack. That is why social engineering should be a part of every pen test. In some form as it's a way to test the organization's human firewall. Testing should include email spoofing, phish attacks, and attempts to direct victims to a bogus website, either on the phone or in person. But since we're dealing with…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Checking physical security3m 44s
-
(Locked)
Identifying wireless vulnerabilities3m 48s
-
(Locked)
Testing the website3m 24s
-
(Locked)
Leaking data via email or VoIP3m 36s
-
(Locked)
Safeguarding cloud services3m 56s
-
(Locked)
Assessing the mobile infrastructure2m 40s
-
(Locked)
Hacking the human3m 25s
-
(Locked)
-
-