Useful Links
Computer Science
Cybersecurity
Ethical Hacking
1. Foundations of Ethical Hacking
2. Networking Fundamentals for Hackers
3. The Ethical Hacking Methodology
4. Web Application Security Testing
5. Wireless Network Security
6. Social Engineering
7. Mobile Device Security
8. Cryptography and Cryptanalysis
9. Advanced Evasion and Anti-Forensics
10. Cloud Security and IoT Hacking
Social Engineering
Psychological Principles
Influence and Persuasion
Authority Principle
Impersonating Authority Figures
Creating False Authority
Social Proof Principle
Consensus Building
Bandwagon Effect
Commitment and Consistency
Commitment Escalation
Consistency Exploitation
Reciprocity Principle
Creating Obligation
Gift and Favor Tactics
Liking Principle
Similarity Building
Compliment Tactics
Scarcity Principle
Limited Time Offers
Exclusive Opportunities
Cognitive Biases
Confirmation Bias
Anchoring Bias
Availability Heuristic
Authority Bias
Trust Exploitation
Trust Building Techniques
Trust Transfer Methods
Institutional Trust Abuse
Human-Based Social Engineering
Impersonation Attacks
Identity Theft
Employee Impersonation
Vendor Impersonation
Authority Figure Impersonation
Pretexting
Scenario Development
Background Research
Conversation Management
Elicitation Techniques
Information Gathering
Casual Conversation Exploitation
Professional Networking Abuse
Physical Social Engineering
Tailgating and Piggybacking
Physical Access Bypass
Security Control Circumvention
Dumpster Diving
Information Recovery
Document Analysis
Digital Media Recovery
Shoulder Surfing
Password Observation
Sensitive Information Capture
Lock Picking and Bypass
Physical Security Testing
Lock Manipulation Techniques
Telephone-Based Attacks
Vishing (Voice Phishing)
Caller ID Spoofing
Voice Manipulation
Interactive Voice Response Abuse
Phone System Exploitation
Voicemail Hacking
Conference Bridge Abuse
PBX System Attacks
Technology-Based Social Engineering
Email-Based Attacks
Phishing Campaigns
Mass Phishing
Targeted Phishing
Business Email Compromise
Spear Phishing
Target Research
Personalized Attacks
Executive Targeting
Whaling Attacks
C-Level Executive Targeting
High-Value Target Identification
Email Spoofing
Sender Impersonation
Domain Spoofing
Display Name Spoofing
Web-Based Attacks
Watering Hole Attacks
Website Compromise
Targeted Malware Delivery
Fake Websites
Credential Harvesting Sites
Malware Distribution Sites
Search Engine Manipulation
SEO Poisoning
Malicious Advertisement
Mobile-Based Attacks
SMS Phishing (Smishing)
Text Message Attacks
Mobile Malware Distribution
Mobile Application Attacks
Fake Application Distribution
Application Impersonation
Physical Media Attacks
USB Baiting
Malicious USB Distribution
Autorun Exploitation
CD/DVD Baiting
Physical Media Distribution
Social Engineering Payloads
Social Engineering Defense
Security Awareness Training
Phishing Simulation
Social Engineering Recognition
Incident Reporting Procedures
Technical Controls
Email Security Solutions
Web Filtering
Endpoint Protection
Policy and Procedures
Information Handling Policies
Verification Procedures
Incident Response Plans
Previous
5. Wireless Network Security
Go to top
Next
7. Mobile Device Security