Course Outline
Introduction
What is Social Engineering
- Types of Malware for Government
- The Evolution of Malware for Government
Overview of Malware Attacks for Government
- Propagating Malware for Government
- Non-Propagating Malware for Government
Information Gathering for Government
- Domain Information for Government
- Networking Accounts for Government
- Maltego Overview for Government
Preparing the Penetration Testing Laboratory for Government
- Installing and Configuring a Virtual Machine for Government
- Installing and Configuring Maltego (Information Gathering Tool) for Government
Generating Evil Files for Government
- Installing and Configuring BeeLogger for Government
- Implementing Command Line Scripts to Access an Operating System That Uses Bash for Government
- Creating an Advanced Backdoor for Government
- Creating a Custom Remote Keylogger for Government
- Logging Saved Passwords for Government
- Executing Payload for Government
- Reporting Payload for Government
Delivery Options for Government
- Initiating an SMTP Server for Government
- Spoofing Emails for Government
- Replicating Any Legitimate Login Page for Government
- Directing Targets to Access an Evil URL for Government
Social Engineering Prevention for Government
- Recognizing Spoofed Emails for Government
- Protecting Against Browser Exploits for Government
- Detecting Malware Manually or Using a Sandbox for Government
Summary and Conclusion for Government
Requirements
- Experience with information systems for government
Audience
- Information system analysts in the public sector
Testimonials (4)
It was clear and with very good examples
Carlo Beccia - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.