Social Engineering Training Course
Social engineering involves extracting sensitive data through psychological manipulation. Because it exploits human error, it is more difficult to anticipate and mitigate than intrusions driven by malware.
This instructor-led, live training (available online or onsite) is designed for information analysts who want to understand the techniques and processes behind social engineering in order to safeguard sensitive corporate information.
Upon completion of this training, participants will be able to:
- Configure the required development environment to begin creating custom malware.
- Insert backdoors into legitimate web applications without detection.
- Disguise malicious files as standard file types.
- Employ social engineering tactics to direct targets to a fraudulent website.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation within a live laboratory environment.
Customization Options
- To request a customized version of this course, please contact us to arrange.
Course Outline
Introduction
What is Social Engineering
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Information Gathering
- Domain information
- Networking accounts
- Maltego overview
Preparing the Penetration Testing Laboratory
- Installing and configuring a virtual machine
- Installing and configuring Maltego (information gathering tool)
Generating Evil Files
- Installing and configuring BeeLogger
- Implementing command lines scripts to access an operating system that uses bash
- Creating an advanced backdoor
- Creating a custom remote keylogger
- Logging saved passwords
- Executing payload
- Reporting payload
Delivery Options
- Initiating an SMTP server
- Spoofing emails
- Replicating any legitimate login page
- Directing targets to access an evil URL
Social Engineering Prevention
- Recognizing spoofed emails
- Protecting against browser exploits
- Detecting malware manually or using a sandbox
Summary and Conclusion
Requirements
- Experience with information systems
Audience
- Information system analysts
Open Training Courses require 5+ participants.
Social Engineering Training Course - Booking
Social Engineering Training Course - Enquiry
Social Engineering - Consultancy Enquiry
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.
Otilia Pasareti - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led live training in Slovakia (online or onsite) is tailored for beginner-level cybersecurity professionals seeking to leverage AI for enhanced threat detection and response.
By the end of this training, participants will be able to:
- Understand AI applications in cybersecurity.
- Implement AI algorithms for threat detection.
- Automate incident response with AI tools.
- Integrate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Slovakia (online or onsite) is designed for intermediate to advanced cybersecurity professionals seeking to elevate their skills in AI-driven threat detection and incident response.
Upon completion of this training, participants will be able to:
- Deploy advanced AI algorithms for real-time threat detection.
- Customize AI models to address specific cybersecurity challenges.
- Develop automation workflows for effective threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves finding security weaknesses in software, websites, or systems and reporting them responsibly to receive rewards or recognition.
This instructor-led live training (available online or onsite) is designed for beginner-level security researchers, developers, and IT professionals who want to learn the basics of ethical bug hunting and how to join bug bounty programs.
By the end of this training, participants will be able to:
- Understand the core concepts of vulnerability discovery and bug bounty programs.
- Use key tools like Burp Suite and browser dev tools for testing applications.
- Identify common web security flaws such as XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Format of the Course
- Interactive lecture and discussion.
- Hands-on use of bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training for this course based on your organization's applications or testing needs, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation offers an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance methodologies, and the tooling strategies employed by elite bug bounty hunters.
This instructor-led, live training (available online or onsite) is designed for security researchers, penetration testers, and bug bounty hunters at intermediate to advanced levels who aim to automate their workflows, scale reconnaissance efforts, and uncover complex vulnerabilities across multiple targets.
Upon completion of this training, participants will be able to:
- Automate reconnaissance and scanning processes for multiple targets.
- Leverage state-of-the-art tools and scripts utilized in bounty automation.
- Identify complex, logic-based vulnerabilities that extend beyond standard scanning capabilities.
- Construct custom workflows for subdomain enumeration, fuzzing, and reporting.
Format of the Course
- Interactive lectures and discussions.
- Practical application of advanced tools and scripting for automation.
- Guided laboratory sessions focused on real-world bounty workflows and advanced attack chains.
Course Customization Options
- To request a customized training tailored to your bounty targets, automation requirements, or internal security challenges, please contact us to arrange.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Slovakia (online or onsite) is designed for beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is designed to equip Cyber Crime and Fraud Investigators with skills in electronic discovery and advanced investigative methodologies. This course is vital for any professional who may encounter digital evidence during an investigation.
The Certified Digital Forens Examiner training focuses on the systematic methodology required for conducting computer forensic examinations. Students will learn to apply forensically sound techniques to evaluate crime scenes, collect and document relevant data, interview key personnel, maintain the chain of custody, and produce comprehensive findings reports.
The Certified Digital Forensics Examiner program offers significant value to organizations, individual professionals, government agencies, and law enforcement bodies that need to pursue litigation, establish proof of guilt, or implement corrective actions based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler course delivers a structured methodology for managing and responding to cybersecurity incidents with efficiency and effectiveness.
Delivered by an instructor via live online or on-site sessions, this training is designed for IT security professionals with intermediate-level expertise who aim to acquire the tactical skills and knowledge necessary to plan, classify, contain, and manage security incidents.
Upon completion of this training, participants will be capable of:
- Comprehending the incident response lifecycle and its various phases.
- Executing procedures for incident detection, classification, and notification.
- Applying containment, eradication, and recovery strategies effectively.
- Formulating post-incident reports and plans for continuous improvement.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated scenarios.
- Guided exercises targeting detection, containment, and response workflows.
Customization Options
- To arrange customized training tailored to your organization's specific incident response procedures or tools, please contact us.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Slovakia (available online or onsite) is designed for intermediate-level cybersecurity professionals aiming to implement CTEM in their organizations.
After finishing this training, participants will be able to:
- Comprehend the core principles and phases of CTEM.
- Spot and rank risks using established CTEM methods.
- Embed CTEM practices into current security frameworks.
- Apply specialized tools and technologies for ongoing threat oversight.
- Create plans to continuously verify and enhance security controls.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores the management of an incident response team. Given the frequency and complexity of contemporary cyber attacks, the role of first responders is critical, making incident response a vital function for organizations.
As the final line of defense, effective incident response demands robust management processes to detect and address incidents efficiently. Furthermore, managing an incident response team requires specialized skills and knowledge.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Slovakia (online or onsite) is designed for advanced cybersecurity professionals seeking to understand Cyber Threat Intelligence and develop skills to effectively manage and mitigate cyber threats.
Upon completion of this training, participants will be capable of:
- Grasping the core principles of Cyber Threat Intelligence (CTI).
- Evaluating the contemporary cyber threat landscape.
- Gathering and processing intelligence data.
- Conducting advanced threat analysis.
- Utilizing Threat Intelligence Platforms (TIPs) to automate threat intelligence workflows.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Slovakia (online or onsite) covers the different aspects of enterprise security, from AI to database security. It also includes coverage of the latest tools, processes and mindset needed to protect from attacks.
DeepSeek for Cybersecurity and Threat Detection
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to leverage DeepSeek for advanced threat detection and automation.
By the end of this training, participants will be able to:
- Utilize DeepSeek AI for real-time threat detection and analysis.
- Implement AI-driven anomaly detection techniques.
- Automate security monitoring and response using DeepSeek.
- Integrate DeepSeek into existing cybersecurity frameworks.
Digital Investigations - Advanced
21 HoursThis course covers the fundamental principles and methodologies of digital forensics, along with an overview of the various computer forensics tools available. Participants will gain insight into essential forensic procedures designed to ensure that evidence is admissible in court, as well as the associated legal and ethical considerations.
You will learn how to conduct forensic investigations on both Unix/Linux and Windows systems utilizing diverse file systems. The curriculum includes advanced topics such as investigations into wireless, network, web, database, and mobile-related crimes.
Certified Lead Ethical Hacker
35 HoursWhy should you attend?
The Certified Lead Ethical Hacker training course equips you with the essential expertise to conduct information system penetration tests by applying recognized principles, procedures, and techniques. This enables you to identify potential threats within computer networks. Throughout the course, you will acquire the knowledge and skills necessary to manage a penetration testing project or team, as well as plan and execute both internal and external penetration tests in compliance with standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Additionally, you will develop a comprehensive understanding of how to draft reports and propose countermeasures. Through practical exercises, you will master penetration testing techniques and acquire the skills required to lead a pentest team, manage customer communications, and resolve conflicts.
The Certified Lead Ethical Hacking training course offers a technical perspective on information security through ethical hacking, utilizing common techniques like information gathering and vulnerability detection, both within and outside of a business network.
This training aligns with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
Upon mastering the necessary knowledge and skills in ethical hacking, you can take the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. Holding a PECB Lead Ethical Hacker certificate demonstrates that you have acquired the practical skills to perform and manage penetration tests according to best practices.
Who should attend?
- Individuals interested in IT Security, particularly Ethical Hacking, who wish to learn more about the topic or initiate a professional transition.
- Information security officers and professionals aiming to master ethical hacking and penetration testing techniques.
- Managers or consultants seeking to understand how to oversee the penetration testing process.
- Auditors who wish to perform and conduct professional penetration tests.
- Personnel responsible for maintaining the security of information systems within an organization.
- Technical experts who want to learn how to prepare for a pentest.
- Cybersecurity professionals and members of information security teams.