Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
The Art of Social Engineering

You're reading from   The Art of Social Engineering Uncover the secrets behind the human dynamics in cybersecurity

Arrow left icon
Product type Paperback
Published in Oct 2023
Publisher Packt
ISBN-13 9781804613641
Length 234 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Cesar Bravo Cesar Bravo
Author Profile Icon Cesar Bravo
Cesar Bravo
Desilda Toska Desilda Toska
Author Profile Icon Desilda Toska
Desilda Toska
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Part 1: Understanding Social Engineering
2. Chapter 1: The Psychology behind Social Engineering FREE CHAPTER 3. Chapter 2: Understanding Social Engineering 4. Chapter 3: Common Scam Attacks 5. Chapter 4: Types of Social Engineering Attacks 6. Part 2: Enhanced Social Engineering Attacks
7. Chapter 5: Enhanced Social Engineering Attacks 8. Chapter 6: Social Engineering and Social Network Attacks 9. Chapter 7: AI-Driven Techniques in Enhanced Social Engineering Attacks 10. Chapter 8: The Social Engineering Toolkit (SET) 11. Part 3: Protecting against Social Engineering Attacks
12. Chapter 9: Understanding the Social Engineering Life Cycle 13. Chapter 10: Defensive Strategies for Social Engineering 14. Chapter 11: Applicable Laws and Regulations for Social Engineering 15. Index 16. Other Books You May Enjoy

What this book covers

Chapter 1, The Psychology behind Social Engineering, provides a deep dive into the art of manipulation and how attackers leverage psychological principles to influence the actions of victims.

Chapter 2, Understanding Social Engineering, provides an overview of the most common social engineering attacks on social media, how to spot them, and how to avoid them.

Chapter 3, Common Scam Attacks, provides a comprehensive overview of the most common types of scams and how to avoid them.

Chapter 4, Types of Social Engineering Attacks, provides a comprehensive examination of the most common social engineering attack types, coupled with guidance about how to recognize and prevent them.

Chapter 5, Enhanced Social Engineering Attacks, helps you discover how technology is being used by attackers to elevate their social engineering techniques and learn effective methods for the detection and prevention of these attacks.

Chapter 6, Social Engineering and Social Networks Attacks, provides an exploration of the wide-ranging landscape of social engineering attacks through social networks and mobile apps, including comprehensive guidance on how to protect against those attacks.

Chapter 7, AI-Driven Techniques in Enhanced Social Engineering Attacks, explores the intersection of AI and social engineering in cybersecurity, covering AI’s role in advanced attacks, the impact of deepfakes, and AI-driven phishing attacks.

Chapter 8, The Social Engineering Toolkit (SET), provides a deep dive into the SET framework, including its installation and configuration and a comprehensive review of its components, plus invaluable insights into mitigating and defending against SET-driven attacks.

Chapter 9, Understanding the Social Engineering Life Cycle, provides a thorough exploration of the social engineering life cycle, meticulously unveiling its distinct stages while equipping you with indispensable knowledge to protect you and your organization against these attacks.

Chapter 10, Defensive Strategies for Social Engineering, helps you discover modern defensive strategies against social engineering threats, including employee awareness, phishing countermeasures, practical exercises, capture-the-flag exercises, cybersecurity training, and real-world case studies.

Chapter 11, Applicable Laws and Regulations for Social Engineering, helps you navigate the legal landscape, uncovering the protective measures and regulatory frameworks designed to combat social engineering, plus lessons learned from notable legal cases.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image