Social Engineering and Technical Exploitation

Nonmember Price: $99.00
Member Price: $0.00
In stock
Code (SKU)
WB-000013-MSC

1 CPE
Learn the basics of technical exploitation and how hackers target and ultimately exploit vulnerable people and places.

1 CPE

Technical exploitation comes down to four basics: patching, permissions, people, and physical. In a world rife with hackers and exploiters, malware and malice, understanding the influx of bad actors is important in establishing a secure operating environment. Learn the basics of technical exploitation and how hackers target and ultimately exploit vulnerable people and places. A technical background is helpful for grasping the details.

This webinar is sponsored by the ASIS Information Technology Security Community. 

Learning Objectives

Upon completion, participants will:

  • Learn to identity when being solicited for nefarious purposes.
  • Learn how systems are compromised through common techniques.
  • Learn defensive techniques for identifying and countering social engineering.

Credit Information

Completion of this webinar is eligible for 1 CPE credit. CPE credits will be updated in your user profile within 48 hours of completion. Self-reporting of CPE credits is not required.

Expand Your Learning!

ASIS joins the U.S. Department of Homeland Security and the E.U. Agency for Network and Information Security (ENISA) in recognizing October as Cybersecurity Awareness Month. In that vein, the Information Technology Security Community hosts several webinars addressing various cybersecurity topics to help you, your organization, and your communities stay safe online. For more cybersecurity resources, visit https://www.asisonline.org/cybersecurity.

Presenter

Matt James
Apple, Inc.

Matt James is a seasoned security professional, having served in associated roles for more than 15 years. A combat-wounded veteran, Mr. James started his career in cybersecurity following his medical retirement from the U.S. Army. His experience spans the US Department of State to the US Army Special Operations Command, to civilian roles for ManTech, Frontier Communications, ID.me, and now Apple. He resides in the Austin, Texas area with his wife, where he continues supporting veteran and infosec initiatives. 


1 CPE
Write Your Own Review
You're reviewing:Social Engineering and Technical Exploitation