<h4>Cutting-edge social engineering testing techniques</h4>Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic.--<i>Slashdot</i><p></p>Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic <i>Social Engineering in IT Security</i> discusses the roots and rise of social engineering and presents a proven methodology for planning a test performing reconnaissance developing scenarios implementing the test and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.<p></p><ul> <li>Explore the evolution of social engineering from the classic con artist to the modern social engineer</li><li>Understand the legal and ethical aspects of performing a social engineering test</li><li>Find out why social engineering works from a victim's point of view</li><li>Plan a social engineering test--perform a threat assessment scope the test set goals implement project planning and define the rules of engagement</li><li>Gather information through research and reconnaissance</li><li>Create a credible social engineering scenario</li><li>Execute both on-site and remote social engineering tests</li><li>Write an effective social engineering report</li><li>Learn about various tools including software hardware and on-site tools</li><li>Defend your organization against social engineering attacks</li></ul><p></p>
Piracy-free
Assured Quality
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.