Get Free Shipping on orders over $79
Learn Social Engineering : Learn the art of human hacking with an internationally renowned expert - Dr. Erdal Ozkaya

Learn Social Engineering

Learn the art of human hacking with an internationally renowned expert

By: Dr. Erdal Ozkaya

Paperback | 27 March 2018

At a Glance

Paperback


$64.89

or 4 interest-free payments of $16.22 with

 or 

Ships in 5 to 7 business days

Your one stop guide to learn and implement Social Engineering Effectively. About This Book * Learn to implement information security using social engineering * Get hands-on experience of using different tools like Kali Linux, Social Engineering toolkit and so on * Practical approach towards learning social engineering, for IT security Who This Book Is For This book is aimed security professionals, security analyst, penetration testers, or any stakeholder working with information security and wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage What You Will Learn * Learn to implement information security using social engineering * Learn social engineering, for IT security * Understand the role of social media in social engineering * Get acquainted with Practical Human hacking skills * Learn to think like a social engineer * Learn to beat a social engineer In Detail The literature in the book can begin with understanding the concept and the whole idea behind "SOCIAL ENGINEERING" as to what it entirely compasses about and what the objective behind understanding the same is to ward off popular social engineering attacks such as Baiting, Phishing, Pretexting, Spear Phishing, Scareware and so on. Hence it becomes extremely important that we are vary of these attacks and know how to penetrate and test it. This book will initially start with the concept of Social Engineering, different types of Social Engineering attacks, and the damages caused by Social Engineering attacks. Then we will set up the lab environment to use different toolkits and then perform social engineering steps such as information gathering, generating evil files and so on. We will also explore different tools used for doing social engineering such as Social Engineering toolkit. Towards the end of this book, we will learn how to design a threat model prominent in securing our information from Social Engineering threat attacks. By the end of the book, you will be in a position to protect your system from social engineering threats and attacks.

More in Data Encryption

Secure and Smart Cyber-Physical Systems - Danda B Rawat
Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF