{"product_id":"the-art-of-social-engineering-uncover-the-secrets-behind-the-human-dynamics-in-cybersecurity-paperback","title":"The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity - Paperback","description":"\u003cp\u003eby \u003cb\u003eCesar Bravo\u003c\/b\u003e (Author), \u003cb\u003eDesilda Toska\u003c\/b\u003e (Author)\u003c\/p\u003e\u003cp\u003e\u003c\/p\u003e\u003cp\u003e\u003cstrong\u003eUnderstand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guide\u003c\/strong\u003e\u003c\/p\u003eKey Features\u003cul\u003e\n\u003cli\u003eGain insights into the open source intelligence (OSINT) methods used by attackers to harvest data\u003c\/li\u003e\n\u003cli\u003eUnderstand the evolving implications of social engineering on social networks\u003c\/li\u003e\n\u003cli\u003eImplement effective defensive strategies to mitigate the probability and impact of social engineering attacks\u003c\/li\u003e\n\u003cli\u003ePurchase of the print or Kindle book includes a free PDF eBook\u003c\/li\u003e\n\u003c\/ul\u003eBook Description\u003cp\u003eSocial engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.\u003c\/p\u003e\u003cp\u003eThe Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.\u003c\/p\u003e\u003cp\u003eYou'll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.\u003c\/p\u003e\u003cp\u003eBy the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.\u003c\/p\u003eWhat you will learn\u003cul\u003e\n\u003cli\u003eGrasp the psychological concepts and principles used in social engineering attacks\u003c\/li\u003e\n\u003cli\u003eDistinguish the different types of social engineering attacks\u003c\/li\u003e\n\u003cli\u003eExamine the impact of social engineering on social networks\u003c\/li\u003e\n\u003cli\u003eFind out how attackers leverage OSINT tools to perform more successful attacks\u003c\/li\u003e\n\u003cli\u003eWalk through the social engineering lifecycle\u003c\/li\u003e\n\u003cli\u003eGet a glimpse of the capabilities of Social Engineering Toolkit (SET)\u003c\/li\u003e\n\u003c\/ul\u003eWho this book is for\u003cp\u003eThis book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.\u003c\/p\u003eTable of Contents\u003col\u003e\n\u003cli\u003eThe Psychology Behind Social Engineering\u003c\/li\u003e\n\u003cli\u003eUnderstanding Social Engineering\u003c\/li\u003e\n\u003cli\u003eCommon Scam Attacks\u003c\/li\u003e\n\u003cli\u003eTypes of Social Engineering Attacks\u003c\/li\u003e\n\u003cli\u003eEnhanced Social Engineering Attacks\u003c\/li\u003e\n\u003cli\u003eSocial Engineering and Social Network Attacks\u003c\/li\u003e\n\u003cli\u003eAI-Driven Techniques in Enhanced Social Engineering Attacks\u003c\/li\u003e\n\u003cli\u003eThe Social Engineering Toolkit (SET)\u003c\/li\u003e\n\u003cli\u003eUnderstanding the Social Engineering Lifecycle\u003c\/li\u003e\n\u003cli\u003eDefensive Strategies for Social Engineering\u003c\/li\u003e\n\u003cli\u003eApplicable Laws and Regulations for Social Engineering\u003c\/li\u003e\n\u003c\/ol\u003e\u003cdiv\u003e\n\u003cstrong\u003eNumber of Pages:\u003c\/strong\u003e 234\u003c\/div\u003e\u003cdiv\u003e\n\u003cstrong\u003eDimensions:\u003c\/strong\u003e 0.49 x 9.25 x 7.5 IN\u003c\/div\u003e\u003cdiv\u003e\n\u003cstrong\u003ePublication Date:\u003c\/strong\u003e October 20, 2023\u003c\/div\u003e","brand":"Books by splitShops","offers":[{"title":"Default Title","offer_id":47371787272370,"sku":"9781804613641","price":60.46,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0770\/3891\/1666\/files\/bf3a4abe2109877f7dfa2075bd494da8.webp?v=1777634627","url":"https:\/\/box.dadyminds.org\/products\/the-art-of-social-engineering-uncover-the-secrets-behind-the-human-dynamics-in-cybersecurity-paperback","provider":"DADYMINDS BOX","version":"1.0","type":"link"}