Ultimate Hacking: Human

Learn how to identify and respond to social engineering and phishing techniques.

Next Steps:

Overview

Upcoming Course Dates & Locations: View Schedule

Type of Course: Classroom & Virtual Instructor-Led Training

The amount and impact of social engineering attacks increases exponentially every year. As with any other attack vector, hackers are trying to access the weakest link (in this case, people) to steal data and compromise business systems. This class provides the knowledge to think like an attacker and assess the security of your organization before the attackers have a chance. In a classroom setting, through demonstrations, labs, and lectures, instructors will teach you the skills needed to identify and respond to these attacks.

What You'll Learn

McAfee Foundstone consultants and instructors bring real-world experience to the classroom to empower you with the skills to assess your security posture and implement effective countermeasures. Foundstone experts bring their consulting experience of breaking into real enterprise wireless networks and share their methodologies in the classroom.

Key topics are supported by hands-on exercises and labs specifically designed to increase knowledge retention. This course will take you from theoretical knowledge to the all-important ability to “do it,” instead of just talk about it.

Why We Teach This Course

Hackers employ social engineering techniques, including phishing, to attempt to steal corporate data and compromise business systems. This course gives you the necessary skills to properly assess the security of your organization and respond to these attacks.

Who Teaches this Course

Foundstone consultants and managers, who actively practice network penetration engagements on many of the world’s leading corporate, government, and military networks, bring real-world scenarios to the classroom. Collectively, they have performed hundreds of web and e-commerce security assessments, as well as managed security programs at Big Five consulting firms, the United States Air Force, and on Wall Street. Foundstone instructors authored the best-selling “Hacking Exposed: Network Security Secrets & Solutions,” one of the industry’s most popular and respected computer security guides.

Who Should Take this Course

This course is for system and network administrators, security personnel, auditors, consultants, and web designers concerned with web security. Basic Unix and Windows NT competency is required for this course to be fully beneficial.

Continuing Education Credits

This course qualifies for up to 24 hours of continuing professional education (CPE) credits for Certified Information Systems Security Professional (CISSP)/Systems Security Certified Practitioner (SSCP), and 21 hours of CPE credits for Certified Information Systems Auditor (CISA)/Certified Information Security Manager (CISM) holders.