From the course: Cisco Certified Support Technician (CCST) Networking Cert Prep
Unlock this course with a free trial
Join today to access over 25,400 courses taught by industry experts.
Social engineering attacks
From the course: Cisco Certified Support Technician (CCST) Networking Cert Prep
Social engineering attacks
(soft music) - [Instructor] In this video, we're going to consider some common examples of social engineering attacks. And most of these fall under the category of hoaxes where an attacker is attempting to convince someone within an organization that that person in the organization, they're visiting a trusted website, they're using a safe application, they're granting access, or they're giving confidential information to somebody that's authorized to receive that access or receive that information. First, consider phishing. You've probably received those emails claiming to be from a company or an organization that you would normally trust. Maybe it's your bank or a department in your country's government, and those emails might tell you something like, "You need to log in and reset your password, otherwise your account might not be secure." Or they might try to create urgency saying something like, "Your account is going to be closed if you don't log in and update your profile." Now…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Network security2m 16s
-
(Locked)
Threats vs. vulnerabilities2m 15s
-
(Locked)
Social engineering attacks7m 43s
-
(Locked)
Denial of service attacks5m 43s
-
(Locked)
Other common attacks9m 10s
-
(Locked)
Three goals of network security4m 45s
-
(Locked)
Security appliances7m 40s
-
(Locked)
Encryption9m 23s
-
(Locked)
Securing user accounts8m 41s
-
(Locked)
Multifactor authentication2m 13s
-
(Locked)
Wireless security options10m 10s
-
(Locked)
Securing a home wireless router8m 23s
-
(Locked)
-
-