CEH v12: Social Engineering Insider Threats and Identity Theft
Often times the most insecure point in a network is not the network hosts but the end user that works with it.
In this course you;ll explore the concepts and tactics of social engineering attacks where the end user becomes the vulnerable system. The most dangerous attack can come from inside your network. You;ll also examine insider threats including why they;re effective their organization impacts and why they;re difficult to detect and defend against. Identity theft is one of the most common and lucrative avenues of attack. To complete this course you;ll learn the basic concepts motives and goals behind identity theft attacks.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.