Professional Certificate in Social Engineering Persuasion Techniques
-- ViewingNowThe Professional Certificate in Social Engineering Persuasion Techniques is a valuable course that teaches learners the art of persuasion in the context of social engineering. This program is crucial in today's interconnected world where cybersecurity is of utmost importance, and social engineering attacks are becoming increasingly sophisticated.
3.924+
Students enrolled
GBP £ 140
GBP £ 202
Save 44% with our special offer
AboutThisCourse
HundredPercentOnline
LearnFromAnywhere
ShareableCertificate
AddToLinkedIn
TwoMonthsToComplete
AtTwoThreeHoursAWeek
StartAnytime
NoWaitingPeriod
CourseDetails
โข Understanding Social Engineering: An introduction to the concept of social engineering, including definitions, common techniques, and the psychology behind why it works. โข Target Identification and Profiling: How to identify and profile potential targets, including methods for gathering information and assessing vulnerabilities. โข Pretexting and Pretext Development: An in-depth look at pretexting, a common social engineering technique, including how to create convincing pretexts and avoid common mistakes. โข Non-Verbal Communication and Body Language: Understanding the role of non-verbal communication and body language in social engineering attacks, including how to read and use these cues to your advantage. โข Persuasion Techniques and Influence Strategies: An exploration of persuasion techniques and influence strategies, including how to apply them in social engineering attacks. โข Email and Phishing Attacks: A deep dive into email and phishing attacks, including how to create convincing phishing emails, avoid common mistakes, and defend against these types of attacks. โข Telephone and Vishing Attacks: An examination of telephone and vishing attacks, including how to create convincing vishing scripts, avoid common mistakes, and defend against these types of attacks. โข Social Media and Online Reconnaissance: An overview of social media and online reconnaissance, including how to gather information from social media profiles, avoid detection, and use this information in social engineering attacks. โข Physical Security and Tailgating: An exploration of physical security and tailgating, including how to gain unauthorized access to facilities, bypass physical security measures, and use this information in social engineering attacks.
CareerPath
EntryRequirements
- BasicUnderstandingSubject
- ProficiencyEnglish
- ComputerInternetAccess
- BasicComputerSkills
- DedicationCompleteCourse
NoPriorQualifications
CourseStatus
CourseProvidesPractical
- NotAccreditedRecognized
- NotRegulatedAuthorized
- ComplementaryFormalQualifications
ReceiveCertificateCompletion
WhyPeopleChooseUs
LoadingReviews
FrequentlyAskedQuestions
CourseFee
- ThreeFourHoursPerWeek
- EarlyCertificateDelivery
- OpenEnrollmentStartAnytime
- TwoThreeHoursPerWeek
- RegularCertificateDelivery
- OpenEnrollmentStartAnytime
- FullCourseAccess
- DigitalCertificate
- CourseMaterials
GetCourseInformation
EarnCareerCertificate