Social Engineering, The Art of Human Hacking

(2 customer reviews)

Apple Shopping Event

Hurry and get discounts on all Apple devices up to 20%

Sale_coupon_15

$25

15 People watching this product now!
  • Pick up from the Woodmart Store

To pick up today

Free

  • Courier delivery

Our courier will deliver to the specified address

2-3 Days

Free

  • DHL Courier delivery

DHL courier will deliver to the specified address

1-3 Days

Free

  • Warranty 1 year
  • Free 30-Day returns

Payment Methods:

Description

Chapter 1: A Look into the World of Social Engineering
Why This Book Is So Valuable
Overview of Social Engineering
Summary
Chapter 2: Information Gathering
Gathering Information
Sources for Information Gathering
Communication Modeling
The Power of Communication Models
Chapter 3: Elicitation
What Is Elicitation?
The Goals of Elicitation
Mastering Elicitation
Summary
Chapter 4: Pretexting: How to Become Anyone
What Is Pretexting?
The Principles and Planning Stages of Pretexting
Successful Pretexting
Summary
Chapter 5: Mind Tricks: Psychological Principles Used in Social
Engineering
Modes of Thinking
Micro expressions
Neurolinguistic Programming (NLP)
Interview and Interrogation
Building Instant Rapport
The Human Buffer Overflow
Summary
Chapter 6: Influence: The Power of Persuasion
The Five Fundamentals of Influence and Persuasion
Influence Tactics
Altering Reality: Framing
Manipulation: Controlling Your Target
Manipulation in Social Engineering
Summary
Chapter 7: The Tools of the Social Engineer
Physical Tools
Online Information-Gathering Tools
Summary
Chapter 8: Case Studies: Dissecting the Social Engineer
Mitnick Case Study 1: Hacking the DMV
Mitnick Case Study 2: Hacking the Social Security
Administration
Hadnagy Case Study 1: The Overconfident CEO
Hadnagy Case Study 2: The Theme Park Scandal
Top-Secret Case Study 1: Mission Not Impossible
Top-Secret Case Study 2: Social Engineering a Hacker
Why Case Studies Are Important
Summary
Chapter 9: Prevention and Mitigation
Learning to Identify Social Engineering Attacks
Creating a Personal Security Awareness Culture
Being Aware of the Value of the Information You Are Being
Asked For
Keeping Software Updated
Developing Scripts
Learning from Social Engineering Audits
Concluding Remarks
Summary

Specification

Processor

Display

RAM

Storage

Video Card

Connectivity

Features

Battery

Customer Reviews

4.1
14 reviews
2
12
0
0
0

2 reviews for Social Engineering, The Art of Human Hacking

Clear filters
  1. Sosodef

    Thank you Mr Admin

  2. mohak

    Fast delivery. They answered all my questions before the order. I recommend them!

  3. MAkron

    BRAVO à vous !

  4. beverly

    I promised the seller if everything goes smoothly with my order,
    I will leave him a positive review. Well, everything is fine!!

  5. jennifer

    works perfectly.

  6. juicy

    Placed order

  7. Melisa

    Very good site this. Very satisfied buyer.

  8. base

    Order received. Thank you!

  9. vivy

    I bought it for the first time, but everything went clean, now I will recommend you to everyone I know

  10. kellis

    I promised the seller if everything goes smoothly with my order,
    I will leave him a positive review. Well, everything is fine!! I wish your business prosperity,
    thank you again. You helped me very much!

  11. jameson

    wonderful

  12. jessy

    how can i cash out ?

  13. mariana

    leaving postive feedback

  14. andy

    Everything perfect

Add a review

Your email address will not be published. Required fields are marked *

1 2 3 4 5
1 2 3 4 5
1 2 3 4 5