New Training: Social Engineering Attacks and Tools
| new skills - Team Nuggets

New Training: Social Engineering Attacks and Tools

In this 7-video skill, CBT Nuggets trainer Bob Salmans discusses types of social engineering attacks as well as the tools used to execute them. Watch this new CompTIA training.

Learn CompTIA with one of these courses:

This training includes:

  • 7 videos
  • 53 minutes of training

You’ll learn these topics in this skill:

  • Social Engineering Anatomy
  • Social Engineering Attacks
  • Social Engineering Tools
  • Social Engineering Toolkit
  • Using WifiPhisher
  • Pharming With ShellPhish
  • Social Engineering Review

3 Most Common Social Engineering Attacks and How to Prevent Them

Social Engineering attacks are a category of malicious attacks aimed at leveraging human interaction to achieve some malicious intent. The unfortunate reality of data security is that many exploits are facilitated by exploiting human interaction. The reason for this is humans can easily be tricked or manipulated into unintentionally installing malware or ransomware on their computer than a cybercriminal can then use to breach a network.

Three of the most common social engineering attacks are phishing attacks, scareware, and pretexting.

In a phishing attack, cybercriminals will often send an email or social media message to trick a user into clicking a link and inadvertently downloading malicious software on their computer.

In a scareware, cybercriminals will try and trick a user into downloading malicious software by presenting a pop-up that claims that the user has already downloaded malicious software and needs to click on the pop up to remove the malware. In this scenario, the act of clicking on the popup actually initializes the malicious software to gain access to the end user's computer.

In a pretexting attack, a cybercriminal will attempt to impersonate a coworker or IT admin within an organization and request sensitive information such as passwords to be sent to the cybercriminal.



Ultimate Security Cert Guide

A 62-page guide to every Palo Alto, Offensive Security, (ISC)2, Check Point, CompTIA, and Cisco certification, and how they fit into your career.

By submitting this form you agree that you have read, understood, and are able to consent to our privacy policy.

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2021 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 1550 Valley River Drive, Eugene, OR 97401 | 541-284-5522