78,65 €
87,39 €
-10% with code: EXTRA
Social Engineering in IT Security
Social Engineering in IT Security
78,65
87,39 €
  • We will send in 10–14 business days.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Cutting-edge social engineering testing techniques"Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--SlashdotConduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Soc…
  • SAVE -10% with code: EXTRA

Social Engineering in IT Security (e-book) (used book) | bookbook.eu

Reviews

(3.78 Goodreads rating)

Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Cutting-edge social engineering testing techniques"Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot

Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.

  • Explore the evolution of social engineering, from the classic con artist to the modern social engineer
  • Understand the legal and ethical aspects of performing a social engineering test
  • Find out why social engineering works from a victim's point of view
  • Plan a social engineering test--perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
  • Gather information through research and reconnaissance
  • Create a credible social engineering scenario
  • Execute both on-site and remote social engineering tests
  • Write an effective social engineering report
  • Learn about various tools, including software, hardware, and on-site tools
  • Defend your organization against social engineering attacks

EXTRA 10 % discount with code: EXTRA

78,65
87,39 €
We will send in 10–14 business days.

The promotion ends in 17d.15:22:52

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,87 Book Euros!?

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Cutting-edge social engineering testing techniques"Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot

Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.

  • Explore the evolution of social engineering, from the classic con artist to the modern social engineer
  • Understand the legal and ethical aspects of performing a social engineering test
  • Find out why social engineering works from a victim's point of view
  • Plan a social engineering test--perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
  • Gather information through research and reconnaissance
  • Create a credible social engineering scenario
  • Execute both on-site and remote social engineering tests
  • Write an effective social engineering report
  • Learn about various tools, including software, hardware, and on-site tools
  • Defend your organization against social engineering attacks

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)