To engender respect and curiosity for networking and security, to educate ourselves and others on safely navigating the landscape of IT, and to strive for and promote careers in Infosec.
Returning Alumni Guest Speaker
Get link
Facebook
X
Pinterest
Email
Other Apps
Cody Todd comes back to CSUMB as a guest speaker to talk about entering the workforce and life after graduation.
This video covers the process of creating a social engineering script. The "big picture" view shows how to create a social engineering script from what to do, figuring out the goal, and contacting the target to perform the attack goal as a whole process. Next, the "single call" view illustrates a general framework of talking to individuals. The results of the individual social engineering attacks can include but is not limited to such items as contact information and internal information. Several videos of sample social engineering attacks are shown. If you wish to further develop skills related to this topic three books that are recommended: “ How to Win Friends and Influence People ”, “ Thinking Fast and Slow ”, and “ The Art of Deception. ” This video was produced for academic purposes for identifying social engineering. This is not an endorsement of any illegal activity. The purpose is to improve cyber security practices and to educate other...
Here is a video of the workshop! It starts from the very basics and progresses through enough about how to use Linux that you should be able to do about 50% of all the National Cyber League Challenges. You may find this reference document useful: Document
Comments
Post a Comment