5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     EC Council     Certified Ethical hacker     Certified Ethical Hacker (CEH) v11

Often times, the most insecure point in a network is not the network hosts, but the end user that works with it. In this course, you'll explore the concepts and tactics of social engineering attacks, where the end user becomes the vulnerable system. The most dangerous attack can come from inside your network. You'll also examine insider threats, including why they're effective, their organization impacts, and why they're difficult to detect and defend against. Identity theft is one of the most common and lucrative avenues of attack. To complete this course, you'll learn the basic concepts, motives, and goals behind identity theft attacks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Social Engineering, Insider Threats & Identity Theft

  • identify the impact to an organization that is compromised by social engineering attacks
  • recognize characteristics of a social engineering attack
  • recognize the phases of a social engineering attack
  • recognize the types of social engineering attacks
  • identify common scenarios involving insider threats
  • identify suspicious activity that could identify an insider threat
  • recognize the different types of insider threats
  • identify signs of identity theft
  • recognize the reasons for identity theft