Course Outline

Introduction

What is Social Engineering

  • Types of Malware for Government
  • The Evolution of Malware for Government

Overview of Malware Attacks for Government

  • Propagating Malware for Government
  • Non-Propagating Malware for Government

Information Gathering for Government

  • Domain Information for Government
  • Networking Accounts for Government
  • Maltego Overview for Government

Preparing the Penetration Testing Laboratory for Government

  • Installing and Configuring a Virtual Machine for Government
  • Installing and Configuring Maltego (Information Gathering Tool) for Government

Generating Evil Files for Government

  • Installing and Configuring BeeLogger for Government
  • Implementing Command Line Scripts to Access an Operating System That Uses Bash for Government
  • Creating an Advanced Backdoor for Government
  • Creating a Custom Remote Keylogger for Government
  • Logging Saved Passwords for Government
  • Executing Payload for Government
  • Reporting Payload for Government

Delivery Options for Government

  • Initiating an SMTP Server for Government
  • Spoofing Emails for Government
  • Replicating Any Legitimate Login Page for Government
  • Directing Targets to Access an Evil URL for Government

Social Engineering Prevention for Government

  • Recognizing Spoofed Emails for Government
  • Protecting Against Browser Exploits for Government
  • Detecting Malware Manually or Using a Sandbox for Government

Summary and Conclusion for Government

Requirements

  • Experience with information systems for government

Audience

  • Information system analysts in the public sector
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories