• Training
  • 1835

Social Engineering, the Human Side of Security [2 Days]

To improve your organization’s resilience against social engineering, you must first understand the anatomy of social engineering attacks. This social engineering class is developed by leading experts at Truesec who not only investigate real social engineering attacks, but also perform social engineering attacks themselves in assessments and Red Team engagements.

A unique hands-on lab for IT managers and security professionals that covers all vectors of social engineering attacks. Learn how to run a phishing campaign to train your users and how to investigate a suspected phishing attack. Besides phishing, this course covers CEO scams, vishing (phone calls), malicious software, physical intrusions, and many other social engineering vectors.

This two-day class wraps up with a discussion on frameworks and methodologies to increase user awareness and maximize the results of user training.


Who Should Attend:
IT security professionals, CISOs, CSOs


  • Basic understanding of IT
  • Preferably a technical background or technical role


  • Understand how attackers think and different social engineering vectors.
  • Understanding of fundamental psychological principles.
  • Practical use of tools to create phishing campaigns to test your organization.
  • Learn how to investigate phishing and social engineering attacks.
  • Recommended approaches to create awareness and training programs.


  • Virtual machines:
    • Windows 10
    • Kali Linux
  • Office 365 demo tenant

Class Outline

Day 1:

  • Introduction to social engineering
  • Demo: Spearphishing with MFA bypass
  • Recon:
    • Open sources (OSINT)
    • Human sources (HUMINT)
    • Technical recon
  • Phishing:
    • Scenarios and delivery techniques
    • Landing pages, hosting, website cloning, credential collection
    • Post-breach activities: forwarding rules, internal phishing, exfiltration, etc.
    • Protection and detection
  • Sender mailbox
  • Landing pages
  • Post-breach: Forwarding rules, internal phishing, mailbox dumping, etc.
  • Challenge
    • Create a phishing campaign
    • Exfiltrate data from hijacked mailboxes and create forward rules
    • Investigate each other’s campaigns

Day 2:

  • Psychological principles, criminology, and manipulation
  • Vishing:
    • Demo: Caller ID spoofing
  • Physical intrusions:
    • Challenge: Lockpicking
  • Malware
    • Introduction to basic concepts
    • Delivery, concealment, covert channels, and persistence
    • Protection and detection
    • Demo
  • Cyber training and awareness

Latest posts