Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
The Art of Social Engineering

You're reading from   The Art of Social Engineering Uncover the secrets behind the human dynamics in cybersecurity

Arrow left icon
Product type Paperback
Published in Oct 2023
Publisher Packt
ISBN-13 9781804613641
Length 234 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Cesar Bravo Cesar Bravo
Author Profile Icon Cesar Bravo
Cesar Bravo
Desilda Toska Desilda Toska
Author Profile Icon Desilda Toska
Desilda Toska
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Part 1: Understanding Social Engineering
2. Chapter 1: The Psychology behind Social Engineering FREE CHAPTER 3. Chapter 2: Understanding Social Engineering 4. Chapter 3: Common Scam Attacks 5. Chapter 4: Types of Social Engineering Attacks 6. Part 2: Enhanced Social Engineering Attacks
7. Chapter 5: Enhanced Social Engineering Attacks 8. Chapter 6: Social Engineering and Social Network Attacks 9. Chapter 7: AI-Driven Techniques in Enhanced Social Engineering Attacks 10. Chapter 8: The Social Engineering Toolkit (SET) 11. Part 3: Protecting against Social Engineering Attacks
12. Chapter 9: Understanding the Social Engineering Life Cycle 13. Chapter 10: Defensive Strategies for Social Engineering 14. Chapter 11: Applicable Laws and Regulations for Social Engineering 15. Index 16. Other Books You May Enjoy

Preface

Social engineering is one of the most common methods used by attackers to steal data and resources from people, companies, and even governments.

This book, The Art of Social Engineering, provides readers with a comprehensive understanding of social engineering attacks and how to protect against them. It starts by explaining the psychological principles behind social engineering attacks and the current threat landscape and providing a series of examples to help you identify those attacks.

After that, you will learn about the most interesting psychological principles used by attackers, including influence, manipulation, rapport, persuasion, and empathy. You will also understand how attackers leverage technology to enhance their attacks by using fake logins, impersonating emails, displaying fake updates, and even using social media as their favorite means to execute attacks.

Of course, the book will also teach you how to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, capture the flag, and many more tools and techniques.

By the end of this book, you will have a good knowledge of social engineering, which will enable you to easily identify, prepare, and protect against the ever-growing threat of social engineering attacks and keep you and your organization safe!

lock icon The rest of the chapter is locked
Next Section arrow right
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image