0% found this document useful (0 votes)
101 views3 pages

Course Syllabus Social Engineering: Brought To You by

Do you have what it takes to learn the art of social engineering, or master manipulation in cybersecurity? This social engineering course is essential for any aspiring penetration tester. Learn about different types of social engineering attacks and gain hands-on experience in two labs using the Social Engineering Toolkit (SET).

Uploaded by

Mark Yacopetti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views3 pages

Course Syllabus Social Engineering: Brought To You by

Do you have what it takes to learn the art of social engineering, or master manipulation in cybersecurity? This social engineering course is essential for any aspiring penetration tester. Learn about different types of social engineering attacks and gain hands-on experience in two labs using the Social Engineering Toolkit (SET).

Uploaded by

Mark Yacopetti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

 

Course Syllabus

Social Engineering

Instructor Name​: Ken Underhill

Instructor Website​: Cybrary.it/instructor/ken-underhill

Course Creation Date​: April 2019

Course Description and Goals

Course Description: ​This course covers basic information about social engineering. We will
explore some fake social media profiles, craft our very own phishing email and malicious
payload using the Social Engineering Toolkit (SET) in Kali Linux, and play the “victim” by
opening the malicious file. The course will help you understand why you should limit the
information you are sharing on social media. We will also cover some basic items to include in
your security awareness program. This course is beginner level, but students are expected to
have basic computer knowledge. The course is targeted towards students that are studying for
the ECCouncil Certified Ethical Hacker (CEH) and/or the CompTIA Pentest+ certification
examinations.

Prerequisites: ​Students should have a basic understanding of computers and some computer
networking experience is also preferred. Ideally, students will have experienced some type of
end user security awareness training in the past or will be familiar with social engineering
attacks from media stories. This course is intended as an introduction to social engineering and
is beneficial for students pursuing their EC-Council Certified Ethical Hacker (CEH), CompTIA
Pentest+, or other penetration testing related certifications.

Who is this course for? ​CISO’s, Cybersecurity Engineers, College Students

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 
 

Course Goals: ​By the end of this course, students should be able to:

❏ Understand what social engineering is and some common methods used by attackers
❏ Craft a phishing email using the social engineering toolkit (SET)

Labs Used: ​The course is focused on hands-on learning and students will need access to the
Cybrary lab environment to complete the step by step labs. However, students can also choose
to set up their own labs but set up and configuration of those labs will not be covered in this
course.

We will use these labs from the Cybrary catalog:


❏ Practice Labs Certified Ethical Hacker (CEH)- Social Engineering Reconnaissance Lab
❏ CybrScore Phishing Lab

Assessment
Case studies available in supplemental resources

Study Resources​: The supplemental resources section of the course contains step by step lab
guides.

Additional Recommended Cybrary Courses​:


❏ USB Drop Attack
❏ Penetration Testing and Ethical Hacking
❏ Phishing (coming soon in 2019)
❏ Physical Penetration Testing (coming soon in 2019)

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 
 

Course Outline

Module 1​ | Introduction
Lesson 1.1: Introduction (03:00)
Lesson 1.2: What is Social Engineering? (10:00)
Lesson 1.3: Name (Duration in Minutes)

Module 2​ | Name
Lesson 2.1: Social Engineering Lab 1 Part 1 (07:00)
Lesson 2.2: Social Engineering Lab 1 Part 2 (10:00)
Lesson 2.3: Social Engineering Lab 2 (07:00)
Lesson 2.4: Phishing Attack Lab 3 Part 1 (06:00)
Lesson 2.5: Phishing Attack Lab 3 Part 2 (10:00)
Lesson 2.6: Phishing Attack Lab 3 Part 3 (04:00)
Lesson 2.7: Other Courses to Review (01:00)

Module 3​ | Conclusion
Lesson 3.1: Conclusion (01:00)

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 

You might also like