New Orleans, Louisiana

May 13-16, 2024: Social Engineering: Zero to Hero

  • Location:
    Hyatt Centric - New Orleans

    800 Iberville St, New Orleans, LA 70113

  • Registration

This is the companion course to Practical Social Engineering

This 4-day intensive course delves into the critical aspects of social engineering, drawing from the comprehensive insights of the book "Practical Social Engineering." Designed for professionals in cybersecurity, IT, corporate security, and psychology, this course offers a blend of theoretical knowledge and practical exercises. Participants will learn the principles of social engineering, psychological tactics, defense strategies, and ethical considerations, equipping them with the skills to identify, prevent, and counteract social engineering threats in the real world.

Course Outline: Day 1: Understanding the Basics of Social Engineering

  • Introduction to Social Engineering

    • Definition and Scope

    • Historical Context and Evolution

  • Psychological Principles in Social Engineering

    • Influence and Persuasion Techniques

    • Cognitive Biases and Manipulation Tactics

  • Types of Social Engineering Attacks

    • Phishing, Vishing, and Impersonation

    • Real-world Examples and Case Studies

  • Hands-on Exercise: Identifying Social Engineering Red Flags

Day 2: Advanced Tactics and Strategies

  • Crafting Effective Social Engineering Campaigns

    • Planning and Research Techniques

    • Crafting Messages and Scenarios

  • Digital Tools and Technologies

    • Online Footprinting and Information Gathering

    • Utilizing Social Media and Open-Source Intelligence

  • Interactive Workshop: Designing a Mock Social Engineering Campaign

Day 3: Defense Mechanisms and Counteracting Strategies

  • Building a Human Firewall

    • Awareness Training and Education Programs

    • Developing Critical Thinking and Skepticism

  • Organizational Policies and Protocols

    • Incident Response Planning

    • Regular Audits and Security Assessments

  • Role-play Exercise: Responding to a Social Engineering Attack

Day 4: Ethical Considerations and Future Trends

  • Ethics in Social Engineering

    • Legal Boundaries and Moral Implications

    • The Responsibility of Knowledge

  • Emerging Trends and Future Challenges

    • AI and Machine Learning in Social Engineering

    • Preparing for Tomorrow's Threats

  • Course Recap and Open Discussion

Students should bring the following:

  • Pen and Paper for notetaking (or a digital equivalent)

  • A computer capable of running a virtual machine OR access to a cloud VPS (may be limited in GUI tools)

  • An open mind and an eagerness to learn

Registration

 

The OSINTion 2024 Training World Tour

If you're interested in hosting in-person or hybrid (simulcast) training, please complete the form located here.

We offer the following:

  • Custom Training Solutions on these topics:

    • Open Source Intelligence (OSINT)

    • Geospatial Intelligence (GEOINT)

    • Image Intelligence (IMINT)

      • Social Media Intelligence (SOCMINT)

      • Operations Security (OPSEC), Communications Security (COMSEC), and Privacy

      • Cryptocurrency Fundamentals

      • Social Engineering/Human Intelligence (HUMINT)

      • Existing Training offerings

      • Public, Private, or Hybrid options

      • In-Person and Simulcast options

      • If operating concurrently with a conference, Public Speaking and Presentations