From the course: Introduction to Pen Testing for Cybersecurity Professionals

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Hacking the human

Hacking the human

- [Instructor] There's a potential to break into any system no matter how secure or what logical controls are in place. That's because when a malicious actor attempts to break into a building, or get past the firewalls, the goal is always the same, get into the system using any means possible. Logical network defenses, security appliances, and anti-malware protection gets stronger every day. Over time, industry has strengthened our defenses and as a result, malicious actors take advantage of a softer target, the people in an organization, including employees, contractors, and customers by using a social engineering attack. That is why social engineering should be a part of every pen test. In some form as it's a way to test the organization's human firewall. Testing should include email spoofing, phish attacks, and attempts to direct victims to a bogus website, either on the phone or in person. But since we're dealing with…

Contents