From the course: Cisco Certified Support Technician (CCST) Cybersecurity (100-160) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Social engineering attacks
From the course: Cisco Certified Support Technician (CCST) Cybersecurity (100-160) Cert Prep
Social engineering attacks
In this video, we're going to consider some common examples of social engineering attacks. And most of these fall under the category of hoaxes, where an attacker is attempting to convince someone within an organization that that person in the organization, they're visiting a trusted website, they're using a safe application, they're granting access, or they're giving confidential information to somebody that's authorized to receive that access or receive that information. First, consider phishing. You've probably received those emails claiming to be from a company or an organization that you would normally trust. Maybe it's your bank or a department in your country's government. And those emails might tell you something like, "You need to log in and reset your password, otherwise your account might not be secure." Or they might try to create urgency, saying something like, "Your account is going to be closed if you don't log in and update your profile." Now by the way, what is up with…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Module 2: Threat landscape and attack motives35s
-
Categories of attackers2m 35s
-
(Locked)
Motivation for attacks2m 5s
-
(Locked)
Malware4m 22s
-
(Locked)
Social engineering attacks7m 43s
-
(Locked)
Physical attacks3m 6s
-
(Locked)
Denial of service (DoS) attacks5m 42s
-
Man-in-the-middle attacks9m 40s
-
(Locked)
Internet of things (IoT) weaknesses3m 37s
-
(Locked)
Bring your own device (BYOD) considerations4m 37s
-
(Locked)
Advanced persistent threat (APT)2m 52s
-
(Locked)
-
-
-
-
-
-
-
-
-