Plan Szkolenia

Introduction

What is Social Engineering

  • Types of malware
  • The evolution of malware

Overview of Malware Attacks

  • Propagating
  • Non-propagating

Information Gathering

  • Domain information
  • Networking accounts
  • Maltego overview

Preparing the Penetration Testing Laboratory

  • Installing and configuring a virtual machine
  • Installing and configuring Maltego (information gathering tool)

Generating Evil Files

  • Installing and configuring BeeLogger
  • Implementing command lines scripts to access an operating system that uses bash
  • Creating an advanced backdoor
  • Creating a custom remote keylogger
  • Logging saved passwords
  • Executing payload
  • Reporting payload

Delivery Options

  • Initiating an SMTP server
  • Spoofing emails
  • Replicating any legitimate login page
  • Directing targets to access an evil URL

Social Engineering Prevention

  • Recognizing spoofed emails
  • Protecting against browser exploits
  • Detecting malware manually or using a sandbox

Summary and Conclusion

Wymagania

  • Experience with information systems

Audience

  • Information system analysts
 14 godzin

Liczba uczestników



Cena za uczestnika

Opinie uczestników (9)

Szkolenia Powiązane

CRISC - Certified in Risk and Information Systems Control

21 godzin

Standard Java Security

14 godzin

Java and Web Application Security

21 godzin

Advanced Java Security

21 godzin

Advanced Java, JEE and Web Application Security

28 godzin

.NET, C# and ASP.NET Security Development

14 godzin

Powiązane Kategorie