♫musicjinni

i hacked my grandma (social engineering and pretexting) // FREE Security+ // EP 3

video thumbnail
Ready to start your Cybersecurity career? Start learning and get certified here: https://bit.ly/36mSRlw (10% OFF at the CompTIA Store) (Affiliate link)

**Sponsored by CompTIA

Learn more about the CompTIA Security+ Certification: https://bit.ly/35f6LqI
5 Cybersecurity Jobs you can get with the Security+: https://bit.ly/38n0sTU

This is episode 3 of the FREE Security+ course covering the SY0-501 AND SY0-601 exams. This episode covers pretexting, identity theft/fraud, impersonation and tailgating.


Security+ Playlist: http://bit.ly/secplus_TII
👊👊Get EARLY access to the course here: https://bit.ly/thisisitio


SECURITY+ RESOURCES
---------------------------------------------------
CompTIA Store: https://bit.ly/36mSRlw


FREE CompTIA Security+ course, collaborating with @David Bombal and @Keeping IT Simple (Jeremy Cioara)!!


SUPPORT NETWORKCHUCK
---------------------------------------------------
➡️Become a YouTube Member: https://bit.ly/join_networkchuck
👊Join thisisIT: https://bit.ly/thisisitio 👊
☕OFFICIAL NetworkChuck Coffee: https://NetworkChuck.coffee

NEED HELP?? Join the Discord Server: http://bit.ly/nc-discord


(affiliate links below)

🔥MY CEH STUDY TOOLS🔥

📺Video: ITProTV (https://bit.ly/itprotvnetchuck)
📚Book:
https://geni.us/UWAZ1i4 (Amazon)
http://bit.ly/2FsyqWo (O'Reilly, 10 day FREE TRIAL)
🔬Lab: ITProTV Labs (https://bit.ly/itprotvnetchuck)

FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord


other FANTASTIC CCNA training resources:
FULL CCNA course: http://bit.ly/2BJazQG ( @David Bombal )
ITProTV: https://bit.ly/itprotvnetchuck


🔥Learn Python🔥
Codecademy: http://bit.ly/2Me22NH

AFFILIATES & REFERRALS
---------------------------------------------------


(GEAR I USE...STUFF I RECOMMEND)

My network gear: https://geni.us/L6wyIUj

Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck

Buy a Raspberry Pi: https://geni.us/aBeqAL




-vishing
-ethical hacking
-pretexting
-impersonation
-identity theft
-identity fraud
-tailgating
-tail-gating

This is how hackers hack you using simple social engineering

Social Engineering- The art of hacking humans | Prasad Sawant | TEDxElproIntlSchool

What is Social Engineering?

The Basics of Social Engineering (aka How I Break into Casinos and Airports)

Social Engineering example #KaliLinuxHacker

​Hacking Humans : Social Engineering Techniques and How to Protect Against Them

Hacking challenge at DEFCON

The Science Behind Human Hacking (Social Engineering) - Christopher Hadnagy

What is social engineering?

Hacking Humans : Social Engineering Techniques and How to Protect Against Them - Stephen Haunts

Watch this hacker break into a company

Social Engineering- The Art of Human Hacking

Cybersecurity Expert Demonstrates How Hackers Easily Gain Access To Sensitive Information

What is Social Engineering? Social Engineering Explained for Beginners

Social Engineering: The Art Of Hacking Humans

Best of Kevin Mitnick: My First Social Engineering Hack

Pro Hacker: Top 5 Social Engineering Tools [2023]

i hacked my grandma (social engineering and pretexting) // FREE Security+ // EP 3

Social Engineering - How Hackers do it

Hack Password | Social Engineering

Breaking into a Bank - Kevin Mitnick demonstrates the Access Card Attack

Hacking the Human - How Social Engineering Works

The Dark Arts of Social Engineering – SANS Security Awareness Summit 2018

Intro to Social Engineering

What is Social Engineering? Cyber Security Month 2018

Detecting and Defending Social Engineering Attacks

Hacking Humans : Social Engineering Techniques and How to Protect Against Them - Stephen Haunts

Watch This Russian Hacker Break Into Our Computer In Minutes | CNBC

What is Social Engineering || Types of Social Engineering Attacks | #anonymous_rs

The Science of Social Engineering: How to Manipulate People

Disclaimer DMCA