Skip to content

Learn Social Engineering : New Book

Learn Social Engineering : My New Book
My new book, “Learn Social Engineering”, has just been published. This book covers SocialEngineering, from A to Z. It also contains expert opinions and case studies. Troy Hunt’s foreword: Learn Social Engineering to improve information security.
Key Features
Book Description
This book will give you a comprehensive understanding of social engineering. This book will give you an in-depth understanding of how social engineers work to help you avoid and combat social engineering attacks.
Learn Social Engineering begins with a brief introduction to the various types of social engineering attacks and the damages they cause. The lab environment is set up to allow you to experiment with different tools and then perform social engineering steps like information gathering. The book covers topics such as spear phishing and baiting, scareware, and pretexting.
You will be able to protect yourself by the end of this book
Your systems are protected from social engineering threats.
The book covers all aspects of social engineering, from A to Z, as well as excerpts from security experts around the world.
What you’ll learn
I would like to thank all the experts who have contributed in the book :networking-and-servers/learn-social-engineering Troy Hunt creator of haveibeenpwned.comJonathan Trull Microsoft’s Global Chief Security Advisor Yalkin Demirkaya the ex CISO of Bureau of New York Police Department Mitko Bogdanoski key expert of European Union security projects Marcus Murray Cybersecurity expert & VP of TrueSecHasain Alshakarti Cybersecurity ExpertMilad Aslaner Security Person at MicrosoftPaula Januszkiewicz Cybersecurity Expert & CEO of CQURE Inc. Aryeh Goretsky Distinguished Researcher of ESETSami LaihoWindows & Security Expert Sukru Durmaz Forensics expert & CEO of DIFOSE AkademiRaymond P L Comvalius Multi Focused ICT specialist Andy Malone (MVP MCT) World Class technology instructor & Author Chris Jackson Windows Internals Expert MicrosoftOzan Ucar Founder and chief technologist at Keepnet LabsDan Weis Lead Penetration Tester at Kiandra ITGeorge Dobrea Chief Hacking OfficerEmre Tinaztepe , Founder and chief technologist at ZemanaRaif Sarica Multi Focused ICT specialist Leyla Aliyeva Head of Azer CERTOguzhan Filizlibay Microsoft Execute Security AdvisorAbout This Book
*Learn how to use social engineering to implement information security
*Get hands-on experience with Kali Linux, the Social Engineering Toolkit, and other tools
*Practical approach to learning social engineering, for IT security
This Book is For Whom?
This book is for security analysts, penetration testers, security professionals, and anyone who works with information security and wants to learn about social engineering techniques. A prior knowledge of Kali Linux is an advantage
What you will learn
*Learn how to use social engineering to implement information security
*Learn about social engineering to improve IT security
*Understand the role social media plays in social engineering
*Get familiar with Practical Human Hacking skills
*Learn how to think like a social engineering engineer
*Learn how to beat a social engineering expert
In Detail
This book will give you a comprehensive understanding of social engineering. This book will give you an in-depth understanding of how social engineers work to help you avoid and combat social engineering attacks.
Learn Social Engineering begins with a brief introduction to the various types of social engineering attacks and the damages they can cause. The lab environment is set up to allow you to experiment with different tools, and then it will guide you through the social engineering steps like information gathering. The book covers topics such as spear phishing and baiting, as well pretexting and scareware.
You will be able to protect yourself and your system from social engin by the end of this book