Social Engineering and Sniffing


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Employees are often a major security concern in big business, as social engineering is one of the most used methods to gain information and thus allow corporate networks to be hacked. Sniffing of corporate networks is also a method that hackers use to gain access to corporate resources. This course examines different types of social engineering and identity theft, along with sniffing techniques such as flooding and spoofing, the tools used both to perform and prevent them, and countermeasures that can be taken. This course also assists students who are preparing for the EC Council's Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration (hours)
1.5

Lesson Objectives

Social Engineering and Sniffing

  • categorize examples of human-based social engineering
  • recognize methods for computer-based social engineering
  • identify examples of insider attacks
  • identify types of phishing attacks
  • identify the countermeasures for social engineering
  • analyze social engineering scenarios and recommend countermeasures
  • recognize how ARP spoofing works
  • recognize how DNS spoofing works
  • recognize how to counter sniffing
  • recognize the techniques used for ARP, MAC, and DNS sniffing
  • Course Number:
    sp_etih_a04_it_enus