Home / Training / Social Engineering and countermeasures

Social Engineering and countermeasures

Understand, detect and protect against manipulation attacks.

Objective

This training aims to raise awareness among trainees about manipulation attacks that attackers can implement. Key concepts of social engineering and main manipulation techniques will be covered. You will learn to identify threats and adopt best practices to avoid being manipulated.

Specific objectives:

  • Understand social engineering
  • Learn the different techniques used by attackers
  • Know how to identify threats

Prerequisites

  • Accessible to everyone

General Information

  • Code: SEC
  • Duration: 2 days
  • Schedule: 8:30 AM - 5:30 PM
  • Location: Training center, North Urban Center, Tunis

Target audience

  • Anyone wanting to understand manipulation attacks

Resources

  • Course materials
  • 40% demonstration
  • 40% theory
  • 20% practical exercises

Training Program

  • Day 1
    • Introduction to social engineering
    • What is social engineering?
    • Who uses it and for what purpose?
    • What are the risks associated with social engineering?
    • The communication model
    • Presentation
    • Developing your communication model
    • Incentive
    • The principle
    • The goal
    • Preparing your target
    • How to be effective
    • Common incentive examples
    • Impersonation, or how to become anyone
    • The principle
    • Key points for success
    • Examples of successful impersonations
    • The importance of psychology
    • Different perception modes
    • The senses
    • The three main perception modes
    • Visual
    • Auditory
    • Kinesthetic
    • Micro-expressions
    • Neuro-linguistic programming
    • Some SE techniques
    • Body language
    • Anchoring
    • Imitation
    • Baiting
    • Plan B
    • Persuasion
    • The principle
    • Key points
    • Importance of influence
    • Reciprocity
    • Obligation
    • Concession
    • Attractiveness
    • Authority
    • Commitment
    • Framing
    • Manipulation
  • Day 2
    • Tools for social engineering
    • Tools for physical access
    • Lab: lockpicking
    • Tools for information gathering
    • Tools for manipulation
    • Lab: Social Engineer Toolkit
    • Lab: Creating a booby-trapped attachment
    • Prevention and risk reduction
    • Learning to identify manipulation attacks
    • Staff awareness
    • Evaluating information value
    • Access policy
    • Update policy
    • Best practices
    • Social engineering audit

Do not hesitate to contact our experts for any additional information, free study and calculation of an audit service.

Information security is essential for any company that must protect and improve its information assets.

Contact us