back

CompTIA Security+ (SY0-601) (In Production)

Vendor-neutral IT Security7 H 49 M

Episodes
Episodes
  • Threats, Attacks, and Vulnerabilities
    • Social Engineering Techniques
    • Malware
    • Password Attacks - Types
    • Password Attacks - Tools
    • Application Attacks - Injections
    • Application Attacks - XSS and XSRF
    • Application Attacks - System Resources
    • Application Attacks - Replay Attacks
    • Network Attacks - DNS Attacks
    • Network Attacks - Layer 2 Attacks
    • Network Attacks - DoS and DDoS
    • Network Attacks - MiTM and MiTB
    • Network Attacks - Wireless
    • Vulnerabilities
    • Threat Intelligence - OSINT
    • Threat Intelligence - Threat Maps and Feeds
    • Threat Intelligence Vulnerability Databases Feed
    • Threat Actors and Vectors
  • Cryptography
    • Hashing
    • Encryption and Steganography
    • Symmetric vs. Asymmetric Encryption
    • Keys
    • Secure Protocols
    • PKI Concepts
    • IPSec
    • Certificates

Social Engineering Techniques

20 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description

In this episode, we discuss the methods used by bad actors to deceptively manipulate individuals into divulging confidential information through social engineering. We will compare and contrast different types of social engineering techniques like phishing, whaling, spam, spear phishing and more.

Just you? Training a whole team? There's an ITProTV plan that fits.

With more than 5,800 hours of engaging video training for IT professionals, you'll find the courses you and your team need to stay current and get the latest certifications.

This website uses cookies to enhance the user experience. By using this site and service, you agree to the use of cookies as described in the ITProTV Privacy Policy.