Social Engineering in the Enterprise Training

Level

Beginner

Duration

24h / 3 days

Date

Individually arranged

Price

Individually arranged

Social Engineering in the Enterprise Training

The social engineering training is dedicated to key administrative and IT personnel in the enterprise who have access to critical areas of the company’s “know-how,” the loss of which would result in financial, reputational, and social losses. The training can be conducted on-site or online and, depending on needs, delivered in a basic two-day or extended three-day model. The training is workshop-based – it can be tailored for a specific company.

Who is this training for?
  • logo infoshare For accountants, HR staff, IT specialists who must be aware that they are a key link in the company’s resources.
  • logo infoshare For managers of organizational units.
  • logo infoshare For administrators and persons responsible for internal employee training.
  • logo infoshare For all employees of the enterprise.

What You Will Learn

  • Protect your identity on the Internet and use selected manipulation techniques.
  • Recognize attack symptoms and HID implants, such as fake USB drives, etc.
  • Use malicious software to carry out attacks and phishing campaigns.
  • Create or clone ID cards for entry or key management.
  • Generate fake email correspondence and recognize it.
  • Carry out phishing campaigns in your enterprise and test your employees.

Training Program

  1. Introduction to Social Engineering

  • What social engineering is
  • Psychological foundations – how attackers deceive the human brain
  • Case studies of real social engineering attacks
  1. Information Gathering and Attack Preparation

  • OSINT – what can be found online about individuals and companies
  • Darkweb – sources of leaked data and hidden services
  • Exploiting discovered vulnerabilities to prepare an attack
  • Practical exercises

    • Searching for publicly available information about participants
    • Modeling potential attack scenarios
  1. Phishing and Spoofing Campaigns

  • Phishing techniques and attack vectors
  • Creating malicious artifacts on the web
  • Spoofing
    • Impersonating executives (e.g., CEO fraud)
  • Phishing campaigns using cloud infrastructure
  • Anonymization of online actions
  1. Infrastructure Attacks via Social Engineering

  • Examples of attacks on company infrastructure
  • Social engineering as an entry point to technical compromise
  • Creating malware and host takeover scenarios
  1. Social Engineering and Physical Attacks

  • Physical access attacks combined with social engineering
  • Network penetration using HID implants
    • Modified cables
    • Malicious USB drives
    • USB devices disguised as fans or peripherals
  1. Group Exercises and Defense Strategies

  • How to protect yourself and your organization
  • Discussion of detection and protection measures
  • Anti-phishing procedures
  • Building awareness and resilience against social engineering

Contact us

we will organize training for you tailored to your needs

Przemysław Wołosz

Key Account Manager

przemyslaw.wolosz@infoShareAcademy.com

    The controller of your personal data is InfoShare Academy Sp. z o.o. with its registered office in Gdańsk, al. Grunwaldzka 427B, 80-309 Gdańsk, KRS: 0000531749, NIP: 5842742213. Personal data are processed in accordance with information clause.