Social Engineering and counter-measures

Formations Social Engineering and counter-measures

OBJECTIF

This training aims to sensitize the trainees to the manipulative attacks that the attackers can put in place. The key concepts of social engineering and the main techniques of manipulation will be discussed. You will learn to identify threats and adopt good practices to avoid being manipulated.

In particular, the objectives of the training are:

  • Understand social engineering
  • Learn the different techniques used by the attackers
  • Know how to identify threats
  • Adopt good practices

PREREQUISITES

• Accessible à tous

GENERAL INFORMATION

• Code : SEC
• Duration : 2 Days
• schedule : 8h30 - 17h30
• place : training center, Center Urbain Nord

TARGETED AUDIENCE

  • Toute personne désirant comprendre les attaques par manipulation

RESOURCES

• Course materials
• 40% demonstration
• 40% of theory
• 20% practical exercises

PROGRAM OF TRAINING

  • Days 1
  • Introduction to social engineering
  • • What is social engineering?
    • Who uses it and for what purpose?
    • What are the risks of social engineering?

  • The communication model
  • • Presentation
    • Develop your communication model

  • The incentive
  • • The principle
    • The goal
    • Prepare your target
    • How to be effective
    • Common examples of incentives

  • Imposture, or how to become anyone
  • • The principle
    • The key points to succeed
    • Examples of successful impostures

  • The importance of psychology
  • • The different modes of perception
    • The senses
    • The three main modes of perception

      • The visual
      • The auditory
      • The kinesthetic

    • Micro-expressions
    • Neuro-Linguistic Programming

  • Some SE techniques
  • • The gesture
    • Anchorage
    • Imitation
    • Drown the fish
    • Plan B

  • The persuasion
  • • The principle
    • The key points
    • Importance of influence
    • Reciprocity
    • The obligation
    • The concession
    • Attractiveness
    • The authority
    • The commitment
    • Framing (composition)
    • The manipulation

  • Days 2
  • Tools for social engineering
  • •Tools for physical access

      •TP: the lockpicking

    • Tools for information gathering
    • Tools for handling

      • TP: Social Engineer Toolkit
      • TP: Creating a trapped attachment

  • Prevention and risk reduction
  • • Learn to identify manipulation attacks
    • Staff awareness
    • Evaluate the value of information
    • Access Policy
    • Update Policy
    • Good practices
    • Social engineering audit

Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.