Course Content

Module 1: Introduction

04:00
1.1 Introduction

Module 2: The Set Up

08:20
2.1 The Set Up

Module 3: The Profile

06:38
3.1 Volunteer Profile Option 1
03:31
3.2 Volunteer Profile Option 2
06:29
3.3 Volunteer Profile Option 3
04:31
3.4 Social Media and Social Profiling
07:15
3.5 Identity Profiling Examples

Module 4: The Hack

06:32
4.1 Aussie Version Part 1 - Simple Hack Examples
08:43
4.2 Aussie Version Part 2 - Volunteer Identity Hack
06:19
4.3 UK Version Part 1 - Simple Hack Examples
06:05
4.4 UK Version Part 2 - Volunteer Identity Hack
06:26
4.5 American Version Part 1 - Simple Hack Examples
07:55
4.6 American Version Part 2 - Volunteer Identity Hack

Module 5: Protecting Yourself

08:29
5.1 Protecting Yourself

Module 6: Conclusion

00:35
6.1 Conclusion

Course Description

This course has been specifically designed to successfully deliver a live identity hack presentation to an Australian, American or British audience. The course goes through how to use social engineering techniques to safely identify a good volunteer. It also shows how easy it is to do identity profiling and what can be done with the information gathered for identity fraud/theft purposes. Finally, participants will learn some tips and tricks on how they can stay safer online.

Instructed By

Instructor Profile Image
Tom Mason
Senior Partner Development Manager at AWS
Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a How to Do a Live Identity Hack Certificate of Completion

Verticals

CyberSecurity