Главная
Study mode:
on
1
Intro
2
3 Methodologies
3
Statistics : Phishing
4
Examples: Phishing
5
Techniques : Phishing
6
Statistics : Vishing
7
Types of Social Engineer
8
Why Social Engineering?
9
Common Attacks
10
Kevin Mitnick
11
Frank Abagnale
12
Charles Ponzi
13
Social Engineering Techniques
14
Information Gathering
15
Questioning Techniques
16
Pretexting vs Elicitation
17
Manipulation - Fear
18
Manipulation - Guilt
19
Manipulation - Foot in the Door
20
Personal Mitigation Techniques
21
Corporate Mitigation Techniques
Description:
Explore social engineering techniques and protective measures in this 50-minute conference talk from NDC Conferences. Delve into the world of manipulation tactics used by attackers to exploit human vulnerabilities and gain access to critical systems. Learn about pre-texting, elicitation, and body language as tools for deception. Examine real-world examples of phishing and vishing attacks, and understand why social engineering poses such a significant threat to organizations. Discover the methodologies employed by infamous social engineers like Kevin Mitnick, Frank Abagnale, and Charles Ponzi. Gain insights into information gathering, questioning techniques, and various manipulation strategies. Equip yourself with personal and corporate mitigation techniques to safeguard against these psychological attacks and strengthen your organization's human firewall.

Hacking Humans - Social Engineering Techniques and How to Protect Against Them

NDC Conferences
Add to list