Course Outline

Introduction

What is Social Engineering?

  • Types of Malware
  • The Evolution of Malware

Overview of Malware Attacks

  • Propagating Attacks
  • Non-Propagating Attacks

Information Gathering

  • Domain Information
  • Networking Accounts
  • Maltego Overview for Government Use

Preparing the Penetration Testing Laboratory for Government

  • Installing and Configuring a Virtual Machine
  • Installing and Configuring Maltego (Information Gathering Tool) for Government

Generating Evil Files for Government Analysis

  • Installing and Configuring BeeLogger
  • Implementing Command Line Scripts to Access an Operating System Using Bash
  • Creating an Advanced Backdoor for Testing Purposes
  • Developing a Custom Remote Keylogger
  • Logging Saved Passwords for Evaluation
  • Executing and Reporting Payloads in a Controlled Environment

Delivery Options for Government Exercises

  • Initiating an SMTP Server for Simulation Purposes
  • Spoofing Emails to Test Employee Awareness
  • Replicating Legitimate Login Pages for Training Scenarios
  • Directing Targets to Access a Simulated Malicious URL

Social Engineering Prevention Strategies for Government

  • Recognizing Spoofed Emails in Official Communications
  • Protecting Against Browser Exploits in Government Systems
  • Detecting Malware Manually or Using a Sandbox Environment for Government

Summary and Conclusion

Requirements

  • Experience with information systems for government

Audience

  • Information system analysts for government
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories