Course Syllabus Social Engineering: Brought To You by
Course Syllabus Social Engineering: Brought To You by
Course Syllabus
Social Engineering
Course Description: This course covers basic information about social engineering. We will
explore some fake social media profiles, craft our very own phishing email and malicious
payload using the Social Engineering Toolkit (SET) in Kali Linux, and play the “victim” by
opening the malicious file. The course will help you understand why you should limit the
information you are sharing on social media. We will also cover some basic items to include in
your security awareness program. This course is beginner level, but students are expected to
have basic computer knowledge. The course is targeted towards students that are studying for
the ECCouncil Certified Ethical Hacker (CEH) and/or the CompTIA Pentest+ certification
examinations.
Prerequisites: Students should have a basic understanding of computers and some computer
networking experience is also preferred. Ideally, students will have experienced some type of
end user security awareness training in the past or will be familiar with social engineering
attacks from media stories. This course is intended as an introduction to social engineering and
is beneficial for students pursuing their EC-Council Certified Ethical Hacker (CEH), CompTIA
Pentest+, or other penetration testing related certifications.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
Course Goals: By the end of this course, students should be able to:
❏ Understand what social engineering is and some common methods used by attackers
❏ Craft a phishing email using the social engineering toolkit (SET)
Labs Used: The course is focused on hands-on learning and students will need access to the
Cybrary lab environment to complete the step by step labs. However, students can also choose
to set up their own labs but set up and configuration of those labs will not be covered in this
course.
Assessment
Case studies available in supplemental resources
Study Resources: The supplemental resources section of the course contains step by step lab
guides.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
Course Outline
Module 1 | Introduction
Lesson 1.1: Introduction (03:00)
Lesson 1.2: What is Social Engineering? (10:00)
Lesson 1.3: Name (Duration in Minutes)
Module 2 | Name
Lesson 2.1: Social Engineering Lab 1 Part 1 (07:00)
Lesson 2.2: Social Engineering Lab 1 Part 2 (10:00)
Lesson 2.3: Social Engineering Lab 2 (07:00)
Lesson 2.4: Phishing Attack Lab 3 Part 1 (06:00)
Lesson 2.5: Phishing Attack Lab 3 Part 2 (10:00)
Lesson 2.6: Phishing Attack Lab 3 Part 3 (04:00)
Lesson 2.7: Other Courses to Review (01:00)
Module 3 | Conclusion
Lesson 3.1: Conclusion (01:00)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3