OSINT For Social Engineers with Chris Hadnagy


OSINT For Social Engineers with Chris Hadnagy
Event on 2015-12-10 08:30:00
Open-source Intelligence (OSINT) for Social Engineers and security professionals  Chris Hadnagy http://www.social-engineer.com Thursday, December 10, 2015, 8:30 am – 5:00 pm Friday, December 11, 2015, 8:30 am – 5:00 pm Early registration pricing extended until November 30th!  General admission starts on November 30 General admission for members: 99 General admission for non-members: 99   LUNCH INCLUDED     Course Description: Information is the lifeblood of the social engineer. But there is now so much information available that it can be overwhelming. How can we dial in and narrow your focus in ways that will enhance your social engineering abilities? This course will show you the techniques, tricks, and tips used by the professional social engineering penetration testers of Social-Engineer, Inc. Course Outline: This two-day course is not a laundry list of tools. We will also share the methodology, processes, and our own experiences that allow us to successfully apply information to plan and launch realistic social engineering scenarios for our clientele. Having the information is only half of what you need. During these two days, you will learn: Non-tech OSINT gathering Obfuscating your traffic Email headers Search engines Metadata Maltego Social media exploitation Developing realistic attack vectors This course was developed based on student demand from our 5-Day Advanced Practical Social Engineering Course. Now a full two days devoted to the very same methods our team uses during Social Engineering Risk Assessments and Social Engineering Penetration Tests are offered to the students of this class. Student Requirements: * Your own laptop with admin rights to install tools * A willingness to learn About the Trainer Chris Hadnagy is the founder and CEO of Social-Engineer, Inc. Chris possesses over 16 years experience as a practitioner and researcher in the security field. His efforts in training, education, and awareness have helped to expose social engineering as the top threat to the security of organizations today. Chris established the world’s first social engineering framework at www.social-engineer.org, providing an invaluable repository of information for security professionals and enthusiasts. That site grew into a dynamic web resource including a podcast and newsletter, which have become staples in the security industry and are referenced by large organizations around the world. Chris also created the first hands-on social engineering training course and certification, Advanced Practical Social Engineering, attended by law enforcement, military, and private sector professionals. A sought-after writer and speaker, Chris has spoken and trained at events such as RSA, Black Hat, and various presentations for corporate and government clients. Chris is also the best-selling author of two books; Social Engineering: The Art of Human Hacking and Unmasking the Social Engineer: The Human Element of Security. Chris specializes in understanding how malicious attackers exploit human communication and trust to obtain access to information and resources through manipulation and deceit. His goal is to secure companies by educating them on the methods used by attackers, identifying vulnerabilities, and mitigating issues through appropriate levels of awareness and security. Chris is a certified Expert Level graduate of Dr. Paul Ekman’s Micro Expressions courses, having made the study of non-verbal behaviors one of his specialties. In addition, he holds certifications as an Offensive Security Certified Professional (OSCP) and an Offensive Security Wireless Professional (OSWP).

at Wingate by Windham and Conference Center
1209 North IH 35
Round Rock, United States

Leave a comment

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>