People Information Gathering with the Social Engineering Toolkit (SET)
Social Engineering is one of the most common attack vectors. Unfortunately, in this digital age, many people still fall victim to these attacks. In this course, you will learn Initial Access using the Social Engineering Toolkit.
Social engineering assesses people, processes, and procedures by using attack vectors such as email, malicious wireless networks and more in the attempt to breach organizational safeguards.
In this course, People Information Gathering with the Social Engineering Toolkit (SET), you will cover how to utilize the Social Engineer Toolkit for Initial Access in a red team environment.
Author Name: Rishalin Pillay
Author Description:
Rishalin is a prolific author and cybersecurity expert. He has authored several video courses on Pluralsight, as well as three books: “Learn Penetration Testing”, “Offensive Shellcode from Scratch.” and “Ethical Hacking Workshop”. He is also a technical contributor to many other books on topics such as dark web analysis, Kali Linux, offensive security, and SECOPS. He has received the Microsoft Content Publisher Gold and Platinum awards for his contributions to the cybersecurity industry. Rishal… more
Table of Contents
- Course Overview (Tool Introduction)
1min - Social Engineering with Phishing and User Execution
21mins - Resources
0mins
There are no reviews yet.