Главная
Study mode:
on
1
Intro
2
3 Methodologies
3
Statistics : Impersonation
4
Types of Social Engineer
5
Why Social Engineering?
6
Common Attacks
7
Kevin Mitnick
8
Frank Abagnale
9
Charles Ponzi
10
Social Engineering Techniques
11
Information Gathering
12
Questioning Techniques
13
Pretexting vs Elicitation
14
Manipulation - Fear
15
Manipulation - Guilt
16
Manipulation - Foot in the Door
17
Personal Mitigation Techniques
18
Corporate Mitigation Techniques
Description:
Explore social engineering techniques and protective measures in this 41-minute conference talk from NDC Conferences. Delve into the world of manipulation tactics used by attackers to exploit human vulnerabilities and gain access to critical systems. Learn about pre-texting, elicitation, and body language as tools for deception. Discover the methodologies, statistics, and common attacks employed in social engineering, including impersonation. Examine case studies of notorious social engineers like Kevin Mitnick, Frank Abagnale, and Charles Ponzi. Gain insights into information gathering, questioning techniques, and manipulation strategies involving fear, guilt, and the "foot in the door" approach. Equip yourself with personal and corporate mitigation techniques to safeguard against these threats and protect your organization's sensitive information.

Hacking Humans - Social Engineering Techniques and How to Protect Against Them

NDC Conferences
Add to list