CEH Module 8: Social Engineering

<- Back to CEH Certification Main Page

Trojan Horse

Trojan Horse

  • Social Engineering Concepts
    • What is Social Engineering?
    • Behaviors Vulnerable to Attacks
    • Factors that Make Companies Vulnerable to Attacks
    • Why Is Social Engineering Effective?
    • Warning Signs of an Attack
    • Phases in a Social Engineering Attack
  • Social Engineering Techniques
    • Types of Social Engineering
      • Human-based Social Engineering
      • Impersonation
        • Impersonation Scenario
          • Over-Helpfulness of Help Desk
          • Third-party Authorization
          • Tech Support
          • Internal Employee/Client/Vendor
          • Repairman
          • Trusted Authority Figure
      • Eavesdropping and Shoulder Surfing
      • Dumpster Diving
      • Reverse Social Engineering, Piggybacking, and Tailgating
    • Watch these Movies
    • Watch this Movie
    • Computer-based Social Engineering
      • Phishing
      • Spear Phishing
    • Mobile-based Social Engineering
      • Publishing Malicious Apps
      • Repackaging Legitimate Apps
      • Fake Security Applications
      • Using SMS
    • Insider Attack
    • Disgruntled Employee
    • Preventing Insider Threats
    • Common Social Engineering Targets and Defense Strategies
  • Impersonation on Social Networking Sites
    • Social Engineering Through Impersonation on Social Networking Sites
    • Social Engineering on Facebook
    • Social Engineering on LinkedIn and Twitter
    • Risks of Social Networking to Corporate Networks
  • Identity Theft
    • Identity Theft Statistics
    • Identify Theft
    • How to Steal an Identity
      • STEP 1
      • STEP 2
      • Comparison
      • STEP 3
    • Real Steven Gets Huge Credit Card Statement
    • Identity Theft - Serious Problem
  • Social Engineering Countermeasures
    • How to Detect Phishing Emails
    • Anti-Phishing Toolbar
      • Netcraft
      • PhishTank
    • Identity Theft Countermeasures
  • Penetration Testing
    • Social Engineering Pen Testing
      • Using Emails
      • Using Phone
      • In Person
      • Social Engineering Toolkit (SET)

<- Back to CEH Certification Main Page

RELATED COURSES