Social Engineering in the Enterprise Training
Level
BeginnerDuration
24h / 3 daysDate
Individually arrangedPrice
Individually arrangedSocial Engineering in the Enterprise Training
The social engineering training is dedicated to key administrative and IT personnel in the enterprise who have access to critical areas of the company’s “know-how,” the loss of which would result in financial, reputational, and social losses. The training can be conducted on-site or online and, depending on needs, delivered in a basic two-day or extended three-day model. The training is workshop-based – it can be tailored for a specific company.
Who is this training for?
For accountants, HR staff, IT specialists who must be aware that they are a key link in the company’s resources.
For managers of organizational units.
For administrators and persons responsible for internal employee training.
For all employees of the enterprise.
What You Will Learn
- Protect your identity on the Internet and use selected manipulation techniques.
- Recognize attack symptoms and HID implants, such as fake USB drives, etc.
- Use malicious software to carry out attacks and phishing campaigns.
- Create or clone ID cards for entry or key management.
- Generate fake email correspondence and recognize it.
- Carry out phishing campaigns in your enterprise and test your employees.
Training Program
-
Introduction to Social Engineering
- What social engineering is
- Psychological foundations – how attackers deceive the human brain
- Case studies of real social engineering attacks
-
Information Gathering and Attack Preparation
- OSINT – what can be found online about individuals and companies
- Darkweb – sources of leaked data and hidden services
- Exploiting discovered vulnerabilities to prepare an attack
-
Practical exercises
- Searching for publicly available information about participants
- Modeling potential attack scenarios
-
Phishing and Spoofing Campaigns
- Phishing techniques and attack vectors
- Creating malicious artifacts on the web
- Spoofing
- Impersonating executives (e.g., CEO fraud)
- Phishing campaigns using cloud infrastructure
- Anonymization of online actions
-
Infrastructure Attacks via Social Engineering
- Examples of attacks on company infrastructure
- Social engineering as an entry point to technical compromise
- Creating malware and host takeover scenarios
-
Social Engineering and Physical Attacks
- Physical access attacks combined with social engineering
- Network penetration using HID implants
- Modified cables
- Malicious USB drives
- USB devices disguised as fans or peripherals
-
Group Exercises and Defense Strategies
- How to protect yourself and your organization
- Discussion of detection and protection measures
- Anti-phishing procedures
- Building awareness and resilience against social engineering