-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

The Art of Social Engineering
By :

The Art of Social Engineering
By:
Overview of this book
Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.
The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.
You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.
By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.
Table of Contents (17 chapters)
Preface
Part 1: Understanding Social Engineering
Chapter 1: The Psychology behind Social Engineering
Chapter 2: Understanding Social Engineering
Chapter 3: Common Scam Attacks
Chapter 4: Types of Social Engineering Attacks
Part 2: Enhanced Social Engineering Attacks
Chapter 5: Enhanced Social Engineering Attacks
Chapter 6: Social Engineering and Social Network Attacks
Chapter 7: AI-Driven Techniques in Enhanced Social Engineering Attacks
Chapter 8: The Social Engineering Toolkit (SET)
Part 3: Protecting against Social Engineering Attacks
Chapter 9: Understanding the Social Engineering Life Cycle
Chapter 10: Defensive Strategies for Social Engineering
Chapter 11: Applicable Laws and Regulations for Social Engineering
Index
Customer Reviews