Global Certificate in Anticipate, Evade, Defend: Social Engineering
-- ViewingNowThe Global Certificate in Anticipate, Evade, Defend: Social Engineering is a crucial course for individuals seeking to build a career in cybersecurity. This program focuses on social engineering techniques used by attackers to manipulate individuals into divulging sensitive information.
6٬315+
Students enrolled
GBP £ 140
GBP £ 202
Save 44% with our special offer
حول هذه الدورة
100% عبر الإنترنت
تعلم من أي مكان
شهادة قابلة للمشاركة
أضف إلى ملفك الشخصي على LinkedIn
شهران للإكمال
بمعدل 2-3 ساعات أسبوعياً
ابدأ في أي وقت
لا توجد فترة انتظار
تفاصيل الدورة
• Understanding Social Engineering:
This unit will cover the basics of social engineering, including common techniques, methods, and attack vectors. It will also introduce the concept of human vulnerabilities and how attackers exploit them.
• Identifying Targets and Attack Surfaces:
In this unit, learners will explore how to identify potential targets and assess attack surfaces to understand better where they might be vulnerable to social engineering attacks.
• Protecting Personal Information:
This unit will cover best practices for protecting personal information, including password management, two-factor authentication, and secure communication.
• Recognizing and Responding to Phishing Attacks:
In this unit, learners will learn how to identify and respond to phishing attacks, including email, SMS, and voice phishing. It will also cover how to create and implement a phishing awareness program.
• Physical Security and Social Engineering:
This unit will explore the relationship between physical security and social engineering, including how to secure physical spaces and protect against tailgating, dumpster diving, and other physical attack vectors.
• Building a Security Culture:
In this unit, learners will learn how to build a security culture within their organization, including how to communicate security policies, create a security awareness program, and encourage security-conscious behavior.
• Incident Response and Post-Attack Analysis:
This unit will cover best practices for incident response and post-attack analysis, including how to contain and remediate social engineering attacks and how to conduct a post-mortem to identify areas for improvement.
• Legal and Ethical Considerations:
In this unit, learners will explore the legal and ethical considerations surrounding social engineering, including privacy laws, data protection regulations, and ethical hacking practices.
• Advanced Social Engineering Techniques:
This unit will cover advanced social engineering techniques, including pretexting, baiting, quid pro quo attacks, and watering hole attacks. It will also explore how to defend against these attacks and how to create a comprehensive social engineering defense strategy.
المسار المهني
متطلبات القبول
- فهم أساسي للموضوع
- إتقان اللغة الإنجليزية
- الوصول إلى الكمبيوتر والإنترنت
- مهارات كمبيوتر أساسية
- الالتزام بإكمال الدورة
لا توجد مؤهلات رسمية مطلوبة مسبقاً. تم تصميم الدورة للسهولة.
حالة الدورة
توفر هذه الدورة معرفة ومهارات عملية للتطوير المهني. إنها:
- غير معتمدة من هيئة معترف بها
- غير منظمة من مؤسسة مخولة
- مكملة للمؤهلات الرسمية
ستحصل على شهادة إكمال عند الانتهاء بنجاح من الدورة.
لماذا يختارنا الناس لمهنهم
جاري تحميل المراجعات...
الأسئلة المتكررة
رسوم الدورة
- 3-4 ساعات في الأسبوع
- تسليم الشهادة مبكراً
- التسجيل مفتوح - ابدأ في أي وقت
- 2-3 ساعات في الأسبوع
- تسليم الشهادة العادي
- التسجيل مفتوح - ابدأ في أي وقت
- الوصول الكامل للدورة
- الشهادة الرقمية
- مواد الدورة
احصل على معلومات الدورة
احصل على شهادة مهنية