Course Curriculum

(W00) Course Instructions 00:00:00
Week 1: Excuse-me sir, could you give me your password?
(W16M01) Week 1 Overview 00:00:00
(W16M02) Introduction To Social Engineering - Video 00:00:00
(W16M03) Introduction To Social Engineering 00:00:00
(W16M04) Defining Social Engineering - Video 00:00:00
(W16M05) Social Engineering Life Cycle 00:00:00
(W16M06) SE Life Cycle - Video 00:00:00
(W16M07) Psychological Introduction to Influence and Manipulation 00:00:00
(W16M08) Introduction to Rapport - Video 00:00:00
(W16M09) Introduction to Influence & Manipulation 00:00:00
(W16M10) The Six Principles of Influence 00:00:00
(W16M11) Introduction to Influence Aspects of Social Engineering - Video 00:00:00
(W16M12) The Influence Model 00:00:00
(W16M13) Introduction to Personality Types - Video 00:00:00
(W16M14) Remote Analysis: Types of Personality 00:00:00
(W16M15) Digital Profiling: Creating our Initial Repository with Dradis Framework 00:00:00
(W16M16) Dradis Frameworks Basic Usage for Digital Profiling - Video 00:00:00
(W16M17) Final Considerations - Video 00:00:00
(W16M18) Appendix 00:00:00
(W16A01) Task one: Imagine you live in Gotham... 30, 00:00
(W16A02) Task two: Chief Gordon calls! 30, 00:00
(W16A03) Task three: Chief Gordon wants a report. 30, 00:00
Week 2: I know what you did last summer
(W16M20) Welcome to Module II 00:00:00
(W16M21) Welcome to Module II – I know what you did last summer 00:00:00
(W16M22) Introduction to Digital Information Gathering 00:00:00
(W16M23) Introduction to OSINT - Open Source Intelligence - Video 00:00:00
(W16M24) OSINT Frameworks & Tools 00:00:00
(W16M25) theHarvester 00:00:00
(W16M26) Practical theHarvester Usage - Video 00:00:00
(W16M27) Shodan – The First Search Engine for Internet of Things 00:00:00
(W16M29) Scythe Framework 00:00:00
(W16M30) Scythe Account Enumerator - Video 00:00:00
(W16M31) Recon-NG Framework 00:00:00
(W16M32) Recon-ng basic usage - Video 00:00:00
(W16M32) SpiderFoot: Open Source Intelligence Automation 00:00:00
(W16M33) Spiderfoot framework configuration & usage - Video 00:00:00
(W16M34) Paterva Maltego 00:00:00
(W16M35) Maltego Usage - Video 00:00:00
(W16M36) FOCA: Target Information Gathering with Metadata 00:00:00
(W16M37) Using FOCA - Video 00:00:00
(W16M38) Google Hacking – Using Google Dorks 00:00:00
(W16M39) Introduction to Cold Calling 00:00:00
(W16M40) Demonstration of Spoofcard App on Android - Video 00:00:00
(W16M41) Final Considerations - Video 00:00:00
(W16M42) Appendix 00:00:00
(W16A04) Target the Target - Dradis Practice 30, 00:00
(W16A05) Recon-ng practice 30, 00:00
(W16A06) Zeus Botnet Practice 30, 00:00
Week 3: The Heist
(W16M44) Welcome to the Heist - Video 00:00:00
(W16M45) The Heist - Module Overview 00:00:00
(W16M46) Morning Catch – Client Side Attacks Laboratory 00:00:00
(W16M47) Introduction to Morning Catch - Video 00:00:00
(W16M48) Morning Catch Basic Usage - Video 00:00:00
(W16M49) The Social Engineer Toolkit (SET) 00:00:00
(W16M50) Introduction to SET (Social Engineering Toolkit) - Video 00:00:00
(W16M51) Spear Phishing Attacking Vectors - Video 00:00:00
(W16M52) Web Attack Vectors – Java Applet Attack Method - Video 00:00:00
(W16M53) Web Attack Vectors – Metasploit Browser Exploit Method - Video 00:00:00
(W16M54) Web Attack Vectors – Credential Harvester Attack Method - Video 00:00:00
(W16M55) Simple Phishing Toolkit 00:00:00
(W16M56) Sptoolkit Installation - Video 00:00:00
(W16M57) Sptoolkit Introduction to Dashboard - Video 00:00:00
(W16M58) Sptoolkit Phishing Campaign Creation - Video 00:00:00
(W16M59) Phishing Frenzy 00:00:00
(W16M60) Installing Phishing Frenzy on Kali Linux and Basic Usage 00:00:00
(W16M61) Phishing Frenzy Installation on Kali Linux, by Brandon McCann - Video 00:00:00
(W16M62) Phishing Frenzy Dashboard Features - Video 00:00:00
(W16M63) Creating a Phishing Campaign - Video 00:00:00
(W16M64) Credential Harvesting Template Creation - Video 00:00:00
(W16M65) Email Enumeration within Phishing-Frenzy - Video 00:00:00
(W16M66) Powershell Attack Vectors - Video 00:00:00
(W16M67) Social Engineering Ninja V0.4 00:00:00
(W16M68) Social Engineering Ninja 4.0 Framework - Video 00:00:00
(W16M69) What is BeEF? 00:00:00
(W16M70) BeEF Dashboard Introduction - Video 00:00:00
(W16M71) BeEF Persistence Modules - Video 00:00:00
(W16M72) Beef Social Engineering Modules: Clippy & Flash Update - Video 00:00:00
(W16M73) Beef – Pretty Theft - Video 00:00:00
(W16M74) Final Considerations - Video 00:00:00
(W16A07) Morning Catch Practice 30, 00:00
(W16A08) Phishing Frenzy Practice 30, 00:00
(W16A09) BeEF Practice 30, 00:00
Week 4: Scavenging and Looting
(W16M76) Module 4 - Introduction Video 00:00:00
(W16M77) Module 4 Overview 00:00:00
(W16M78) Hidden Camera Gears 00:00:00
(W16M79) GPS Trackers 00:00:00
(W16M80) Introduction to lockpicking 00:00:00
(W16M81) Hidden Audio Recorders 00:00:00
(W16M82) Hardware Keyloggers 00:00:00
(W16M83) Hak5 Stuff 00:00:00
(W16M84) Final Considerations 00:00:00
Final Test
(W16Q01) Final Test 00:25:00
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023