Let's face it: Social Engineering isn't just about email phishing. You need more than just YouTube walkthroughs of the Social Engineer's Toolkit (SET). 

This Social Engineering Expert course is designed as a comprehensive course to teach you how to create and carry out Social Engineering Operations with precision and accuracy, no matter what your background. From the Overview to Micro Expressions and Physical Pretexting to Surveillance, start or bolster your IT Security career here. 

This course has been developed by Jeremiah Talamantes, author of The Social Engineer's Playbook, adjunct professor at Norwich University and CEO of RedTeam Security.

Course Curriculum

  • 1

    Course Introduction

  • 2

    Welcome!

  • 3

    Introduction to Social Engineering

    • Terminology

    • Overview

    • History

    • How It's Used Today

    • Attack Vectors

    • Quiz

  • 4

    Attack Vectors

    • Spear Phishing

    • Phone Phishing

    • Baiting

    • Tailgating

    • Physical Pretexting

    • Quiz

  • 5

    Methodology

    • Preparation

      FREE PREVIEW
    • Planning & Kill Chain

    • Sample Client Interview Questions

    • Social Engineering Operation Plan Template

    • Execution

    • Social Engineering War Stories: Under the Hoodie

    • Authorization Letter Template

    • Social Engineering Report Template

    • Quiz

  • 6

    Information Gathering

    • Non-Technical

    • Reconnaissance Equipment List

      FREE PREVIEW
    • Reconnaissance Field Notes Template

    • Technical

    • Install and Run Maltego & Metagoofil

    • Information Gathering Lab Links

    • Google Dorks List

    • Information Gathering Techniques

    • Quiz

  • 7

    Psychology & Manipulation

    • Influencing

    • Influencing Resources

    • Elicitation

    • Elicitation Resources

    • Quiz

  • 8

    Non-verbal Communication

    • Micro Expressions

    • Body Language

    • Resources

    • Quiz

  • 9

    Next Steps...

    • Congratulations!

    • More resources for you

    • WAIT! Before you go...

About the instructor

Instructor

Jeremiah Talamantes

Jeremiah is the Founder and President of RedTeam Security -- a boutique information security firm specializing in Social Engineering, Penetration Testing, Physical Intrusion Operations and Red Teaming. He has been in IT Security for nearly 20 years and is the author of The Social Engineer’s Playbook: A Practical Guide to Pretexting. Jeremiah has appeared on national TV news outlet, FOX News Live with Adam Housley. Additionally, he has been quoted and interviewed by CNN, Yahoo! Finance, Houston Chronicle,  Business Insider, Tech Insider, CIO Magazine, PenTest Magazine, POWER Magazine, LegalNews, Finance & Commerce and others.Jeremiah has a master’s degree in Information Security & Assurance and an executive business education from the University of Notre Dame, Mendoza School of Business. He is an Adjunct Professor at Norwich University, College of Graduate Studies in Information Security & Assurance. He is a CISSP, CCISO, CEH, CHFI and CCENT.

Learn How to Develop and Execute Professional Social Engineering Operations

You may also be interested in...

  • $10.99

    $10.99AUDIOBOOK: The Social Engineer's Playbook: A Practical Guide to Pretexting

    Buy Now
  • $3.99

    $3.99E-BOOK: The Social Engineer's Playbook: A Practical Guide to Pretexting

    Buy Now