Social Engineering Training Course
Social engineering involves revealing sensitive data by exploiting human psychology. Because it capitalizes on human error, it is more difficult to anticipate and stop than intrusions caused by malware.
This instructor-led, live training (available online or onsite) is designed for information analysts who want to master the techniques and processes of social engineering to safeguard critical corporate information.
Upon completing this training, participants will be capable of:
- Configuring the essential development environment required to build custom malware.
- Inserting undetected backdoors into legitimate web applications.
- Disguising malicious files to appear as normal file types.
- Employing social engineering strategies to redirect targets to fraudulent websites.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical practice.
- Practical implementation within a live laboratory environment.
Customization Options
- To request a tailored version of this course, please contact us to arrange your session.
Course Outline
Introduction
What is Social Engineering
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Information Gathering
- Domain information
- Networking accounts
- Maltego overview
Preparing the Penetration Testing Laboratory
- Installing and configuring a virtual machine
- Installing and configuring Maltego (information gathering tool)
Generating Evil Files
- Installing and configuring BeeLogger
- Implementing command lines scripts to access an operating system that uses bash
- Creating an advanced backdoor
- Creating a custom remote keylogger
- Logging saved passwords
- Executing payload
- Reporting payload
Delivery Options
- Initiating an SMTP server
- Spoofing emails
- Replicating any legitimate login page
- Directing targets to access an evil URL
Social Engineering Prevention
- Recognizing spoofed emails
- Protecting against browser exploits
- Detecting malware manually or using a sandbox
Summary and Conclusion
Requirements
- Experience with information systems
Audience
- Information system analysts
Need help picking the right course?
uzbekistan@nobleprog.com or +919818060888
Social Engineering Training Course - Enquiry
Social Engineering - Consultancy Enquiry
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.
Otilia Pasareti - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at beginner-level cybersecurity professionals who wish to learn how to leverage AI for improved threat detection and response capabilities.
By the end of this training, participants will be able to:
- Understand AI applications in cybersecurity.
- Implement AI algorithms for threat detection.
- Automate incident response with AI tools.
- Integrate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Uzbekistan (online or on-site) is designed for intermediate to advanced-level cybersecurity professionals seeking to elevate their expertise in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customize AI models to address specific cybersecurity challenges.
- Develop automation workflows for effective threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting is the practice of identifying security vulnerabilities in software, websites, or systems and responsibly reporting them for rewards or recognition.
This instructor-led, live training (delivered online or on-site) is designed for beginner-level security researchers, developers, and IT professionals who wish to master the fundamentals of ethical bug hunting and learn how to effectively participate in bug bounty programs.
By the end of this training, participants will be able to:
- Grasp the core concepts of vulnerability discovery and bug bounty programs.
- Leverage key tools such as Burp Suite and browser developer tools for application testing.
- Identify common web security flaws including XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Course Format
- Interactive lectures and discussions.
- Hands-on practice with bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training session tailored to your organization's specific applications or testing requirements, please contact us to make arrangements.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation provides an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance techniques, and the tooling strategies employed by elite bug bounty hunters.
This instructor-led, live training (available online or on-site) is designed for intermediate to advanced-level security researchers, penetration testers, and bug bounty hunters who aim to automate their workflows, scale their reconnaissance efforts, and uncover complex vulnerabilities across multiple targets.
By the end of this training, participants will be able to:
- Automate reconnaissance and scanning across multiple targets.
- Utilize cutting-edge tools and scripts commonly used in bounty automation.
- Identify complex, logic-based vulnerabilities that go beyond standard scans.
- Develop custom workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Hands-on practice with advanced tools and scripting for automation.
- Guided labs focused on real-world bounty workflows and advanced attack chains.
Course Customization Options
- To request a customized training session tailored to your specific bounty targets, automation requirements, or internal security challenges, please contact us to make arrangements.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is designed for beginner to intermediate-level security analysts and system administrators seeking to establish a foundational understanding of Cyber Defence (SOC) analysis.
Upon completing this training, participants will be able to:
- Comprehend the core principles of Security Management within a Cyber Defence framework.
- Apply effective Incident Response strategies to mitigate security breaches.
- Implement Security Education practices to boost organizational awareness and readiness.
- Manage and analyze Security Information to proactively identify threats.
- Utilize Event Management techniques for monitoring and responding to security events.
- Execute Vulnerability Management processes to detect and resolve system weaknesses.
- Develop Threat Detection skills to identify and address potential cyber threats.
- Engage in Simulated Attacks to test and refine incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe Certified Digital Forensics Examiner vendor-neutral certification is designed to train Cyber Crime and Fraud Investigators, equipping students with advanced electronic discovery and investigation techniques. This course is essential for anyone who encounters digital evidence during an investigation.
The Certified Digital Forensics Examiner training teaches the methodology for conducting computer forensic examinations. Students will learn to apply forensically sound investigative techniques to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain the chain of custody, and prepare a comprehensive findings report.
The Certified Digital Forensics Examiner course benefits organizations, individuals, government offices, and law enforcement agencies that seek to pursue litigation, establish proof of guilt, or take corrective action based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler course offers a structured methodology for effectively and efficiently managing and responding to cybersecurity incidents.
This instructor-led, live training (available online or on-site) is designed for intermediate-level IT security professionals seeking to develop the tactical skills and knowledge required to plan, classify, contain, and manage security incidents.
By the end of this training, participants will be able to:
- Understand the incident response lifecycle and its phases.
- Execute procedures for incident detection, classification, and notification.
- Apply containment, eradication, and recovery strategies effectively.
- Develop post-incident reporting and continuous improvement plans.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated scenarios.
- Guided exercises focused on detection, containment, and response workflows.
Course Customization Options
- To request a customized training session tailored to your organisation's incident response procedures or tools, please contact us to arrange.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is designed for intermediate-level cybersecurity professionals who aim to implement CTEM within their organizations.
Upon completing this training, participants will be capable of:
- Gaining a clear understanding of CTEM’s core principles and stages.
- Identifying and prioritizing risks through established CTEM methodologies.
- Seamlessly integrating CTEM practices into current security protocols.
- Effectively utilizing tools and technologies dedicated to continuous threat management.
- Creating strategies to continually validate and enhance security measures.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores the management of an incident response team. Given the frequency and complexity of modern cyber attacks, incident response has become a critical function for organizations, dictating how first responders should act.
As the last line of defense, incident response requires robust management processes to detect and efficiently address incidents. Managing an incident response team, therefore, demands specialized skills and knowledge.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training (online or onsite) targets advanced cybersecurity professionals seeking to understand Cyber Threat Intelligence and develop skills to effectively manage and mitigate cyber threats.
Upon completing this training, participants will be able to:
- Grasp the core principles of Cyber Threat Intelligence (CTI).
- Evaluate the current landscape of cyber threats.
- Gather and process intelligence data efficiently.
- Conduct advanced threat analysis.
- Utilize Threat Intelligence Platforms (TIPs) to automate threat intelligence workflows.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Uzbekistan (online or onsite) covers various aspects of enterprise security, from AI to database security. It also includes coverage of the latest tools, processes and mindset needed to protect from attacks.
Ethical Hacker
35 HoursIn this course, students will be immersed in an interactive setting designed to demonstrate how to scan, test, exploit, and secure their own systems. The lab-intensive environment provides each student with in-depth knowledge and practical experience with essential security tools. The journey begins with understanding perimeter defenses, progressing to scanning and attacking their own networks in a safe environment where no real infrastructure is compromised. Participants will learn how intruders escalate privileges and identify the steps necessary to secure a system. The curriculum also covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. Upon completing this intensive 5-day class, students will possess hands-on understanding and practical experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
This course is ideal for professionals working in positions such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
Certified Lead Ethical Hacker
35 HoursWhy attend this course?
The Certified Lead Ethical Hacker training program equips you with the essential expertise to conduct information system penetration tests. By applying recognized principles, procedures, and testing techniques, you will learn to identify potential threats within computer networks. Throughout the course, you will acquire the knowledge and skills required to manage a penetration testing project or team, as well as to plan and execute internal and external pentests in alignment with standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Additionally, you will gain a comprehensive understanding of how to draft reports and propose countermeasures. Through practical exercises, you will master penetration testing techniques and develop the abilities needed to manage a pentest team, handle customer communications, and resolve conflicts.
This training course offers a technical perspective on information security through ethical hacking, utilizing common techniques like information gathering and vulnerability detection, both inside and outside of business networks.
The curriculum is also aligned with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
Once you have mastered the necessary knowledge and skills in ethical hacking, you may take the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. Holding a PECB Lead Ethical Hacker certificate demonstrates that you possess the practical skills to perform and manage penetration tests according to industry best practices.
Who should attend?
- Individuals interested in IT Security, particularly ethical hacking, who wish to learn more about the field or begin a professional transition.
- Information security officers and professionals aiming to master ethical hacking and penetration testing techniques.
- Managers or consultants seeking to understand how to oversee the penetration testing process.
- Auditors looking to perform and conduct professional penetration tests.
- Personnel responsible for maintaining the security of organizational information systems.
- Technical experts who want to learn how to prepare for a pentest.
- Cybersecurity professionals and members of information security teams.
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker certification is a highly sought-after cybersecurity credential recognised globally.
This programme combines comprehensive instruction and hands-on practice to prepare students for both the CEH certification exam and the CEH Practical Exam. Candidates who successfully pass both examinations earn the CEH Master credential in addition to their CEH certification.
Students are offered the option to include either the CPENT or the CHFI course within their package.
Training for either the Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course will be delivered to each student via EC-Council’s online, self-paced, streaming video platform.
CPENT (Pen-test):
Teaches students how to apply the concepts and tools covered in the CEH programme within a live cyber range, using a penetration testing methodology.
CHFI (Computer Forensics):
Provides students with a methodological approach to computer forensics, covering the search and seizure, chain of custody, acquisition, preservation, analysis, and reporting of digital evidence.
Course Description
CEH offers an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It teaches you how hackers think and act maliciously, enabling you to better position your security infrastructure to defend against future attacks. A thorough understanding of system weaknesses and vulnerabilities helps organisations strengthen their security controls and minimise the risk of incidents.
CEH was designed to incorporate a hands-on environment and a systematic process across each ethical hacking domain and methodology, giving you the opportunity to demonstrate the knowledge and skills required to achieve the CEH credential. You will be exposed to a completely different perspective on the responsibilities and measures necessary to maintain security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defence and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. This exam was designed to give students the opportunity to prove they can execute the principles taught in the CEH course. The practical exam requires you to demonstrate the application of ethical hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical does not include simulations. Instead, you will be challenged on a live range designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges found in the CEH Practical Exam is the next step after attaining the Certified Ethical Hacker (CEH) certification. Successfully passing both the CEH exam and the CEH Practical will earn you the additional certification of CEH Master.
About the Certified Ethical Hacker Practical
To prove your skills in ethical hacking, we test your abilities with real-world challenges in a realistic environment, using labs and tools that require you to complete specific ethical hacking tasks within a time limit, just as you would face in practice.
The EC-Council CEH (Practical) exam consists of a complex network that replicates a large organisation’s real-life environment and includes various network systems (including DMZ, Firewalls, etc.). You must apply your ethical hacking skills to discover and exploit real-time vulnerabilities while also auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) programme focuses entirely on penetration testing and will teach you to perform in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only worked with flat networks, CPENT’s live practice range will elevate your skills by teaching you to pen-test IoT systems, OT systems, write your own exploits, build custom tools, conduct advanced binary exploitation, perform double pivots to access hidden networks, and customise scripts and exploits to penetrate the innermost segments of a network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course delivers the discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive programme covering major forensic investigation scenarios and enabling students to acquire the necessary hands-on experience with various forensic investigation techniques and standard forensic tools required to successfully conduct a computer forensic investigation.