Protect Yourself Against Social Hackers!

Learn how to handle 13 most common social engineering techniques designed to pressure you within just 45 minutes! Upgrade yourself now!

Benefits

Best Practices

Follow a structured, detailed approach to learn the best practices complete with practical examples and a quiz to test your knowledge!

Fast Learning!

Years worth of experience condensed into short videos. Within 45 minutes you understand how to protect yourself against Hackers!

Exclusive Webinar

Access to an exclusive webinar where you can ask your most pressing questions directly to, me, the creator of the course!

Test your knowledge here!

Do you understand how hackers could steal your identity? Do you know how to protect yourself against that threat? The proof of the pudding is in the eating, are you ready?

Here's What's Inside The Course:

LESSON #1:

Introduction: What is social engineering?

LESSON #2:

Security basics: a brief history….

LESSON #3:

A classic (and real) a social engineering attack

LESSON #4:

Security basics: what are security risks?

LESSON #5:

Security basics: types of “hackers”

LESSON #6:

The weakest link

LESSON #7:

The social engineering attacks - Authority

LESSON #8:

The social engineering attacks - Deceptive Relationships

LESSON #9:

The social engineering attacks - Overloading

LESSON #10:

The social engineering attacks - Scarcity

LESSON #11:

The social engineering attacks - Social Validation

LESSON #12:

The social engineering attacks - Phishing

LESSON #13:

The social engineering attacks - Baiting

LESSON #14:

The social engineering attacks - Pharming

LESSON #15:

The social engineering attacks - IVR or Phone Phishing

LESSON #16:

The social engineering attacks - Quid Pro Quo

LESSON #17:

The social engineering attacks - Tailgating

LESSON #18:

Bonus - Shoulder surfing

LESSON #19:

Bonus - Unclean desk

About Security Repo

Security Repo was founded by Soerin Bipat, a (chief) information security officer, teacher and researcher. His passion is to develop an information security and privacy strategy along with the customer to achieve their goals. He has been active in several layers of the IT and business domain for almost 15 years.

Our mission at Security Repo is to provide security education to anyone who needs to protect data. We specialise in creating content that shares best practices based on scientific research and requires limited prerequisite knowledge.

Whether you’re new to information security or want to refresh your memory on something you’ve learned in the past, Security Repo has you covered.

Testimonials

Watch a Sneak Preview!

Watch 10 minutes of several videos that are part of this course for free! The full course contains all the a lessons described above. Enrol and learn how to protect yourself against the 13 most common social engineering techniques designed to pressure you! 

FAQ

I have a 30-day 100% money back guarantee, so if you aren’t happy with your purchase, I will refund your course – no questions asked! However, students love this course and I’m pretty sure you will too.

This course will teach you the most common social engineering threats. At the end of the course you will understand why people are the weakest link in your organisations security posture. You will understand:

1) what the most common social engineering threats and are,
2) the impact per threat for your business, 
3) how these threats can be executed and / or mitigated. 

You will able to understand the above-mentioned points without having to understand technical stuff (e.g. source code) within ONE HOUR!

  • Testimonial from Guido: A great election, very nice content and explications

Social engineering is closely related to psychology. Social engineering can be defined as the art of manipulating people in order to achieve a goal. Therefore, this course is created for managers rather than developers. Managers must train their employees to strengthen their personal firewall (i.e. being less likely to fall victim to manipulation), because collectively all employees make up your organisation’s firewall! 

  • Testimonial from Gaston: Very well explained!

Whether you’re just staring with your first academic assignment or or want to refresh your memory, this course has short videos that are easy to understand and require not prerequisite knowledge!

Who should enroll?
– Anyone interested in protecting themselves against hackers
– Anyone interested in the basics of social engineering, explained in layman’s terms
– (Project) managers that depend on IT
– Security managers tasked to deliver basic security awareness training
– Managers that want to create a more secure organisational culture

Herewith some of the learning objectives you can expect after following this course:

1. Strengthen your personal firewall! You will be more vigilant, aware and thus better prepared against hackers
2. Identify the most common social engineering attacks (no coding skills required!)
3. Explain the threat, impact and remediation for the most common attacks

True, let me explain by giving you an overview of my experience:
– Parttime PhD researcher. I read the science, you’ll get the knowledge! What more do you want? 
– (Chief) Information Security Officer.  Responsible for implementing and maintaining a well balanced organisational risk posture;
– Software consultant (6,5 years). I’ve advised many managers of large / small IT projects on various software related aspects. 

Besides that I hold several certifications:
– CISSP which stands for Certified Information Systems Security Professional
– CSSLP which stands for Certified Secure Software Lifecycle Professional
– CISA stands for Certified Information Systems Auditor
– CIPP/E stands for Certified Information Privacy Professional / Europe

All four certifications are vendor-neutral certification programs. 

The course is made available online and you can log on to it and watch the videos, just like any other service. 

This courses is created such that everybody can follow it. Prerequisites are:
– Pen and paper to take notes
– Willingness to play with presented content

While online learning may not be for everyone, this course comes with an exclusive webinar for you to ask your most pressing questions or just to follow Q&A asked by the community!

Sure! Scroll up and you will find a sneak preview video on this page. Watch these videos for free. When you like me teaching style, do not hesitate to enrol and take your academic writing skills to the next level!

Difficult question to answer, but here is my best shot:

– You can get access to the course creator, me, via an exclusive webinar and ask any question related to this subject.
– I’ve developed and based on scientific best practices. I read the science, you get the best practices.  That is a good deal! 
– This course is super short (45 minutes), designed to give you only the gems and doesn’t bother you with long tedious long lectures that in essence waste your precious time.
– You get an eBook of this entire course for FREE!!    
– You can get your money back within 30 days of the purchase if you did not like the course. So there is literally no reason to hesitate. Enrol now and upgrade yourself today!

NOW, YOU'RE PROBABLY WONDERING...

"How much would it cost
me to join?

Well, if you’re going to add all the lessons and bonuses…

  • 19 Easy-to-Understand Lessons About OWASP Top 10
  • BONUS #1: Additional videos
  • BONUS #2: !! EXCLUSIVE ACCESS TO TEACHER THROUGH A WEBINAR !!
  • BONUS #3: Ask a question
  • BONUS #4: 1 Continuing Professional Education (CPE) Credit

… you’ll have to pay at least $350.

And considering it costed me thousands of dollars in formal education…

… and several years of practice and experience…

$350 is very reasonable

But I’m not going to charge you that amount for this course because it’s my mission to help as many people as I can to reduce web application security exploits.

I won’t even charge you $200…

Not even $100…

Because today...

You'll Get Everything For Only...

... a one-time fee of $350
$12.99!