CEH v11: Social Engineering Insider Threats & Identity Theft
Often times the most insecure point in a network is not the network hosts but the end user that works with it. In this course you;ll explore the concepts and tactics of social engineering attacks where the end user becomes the vulnerable system. The most dangerous attack can come from inside your network. You;ll also examine insider threats including why they;re effective their organization impacts and why they;re difficult to detect and defend against. Identity theft is one of the most common and lucrative avenues of attack. To complete this course you;ll learn the basic concepts motives and goals behind identity theft attacks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.