Dr. Erdal Ozkaya
Search
  • Home
  • Cybersecurity
  • Learn Social Engineering : New Book

Learn Social Engineering : New Book

Learn Social Engineering with Dr Erdal Ozkaya Foreword by Troy Hunt
Erdal2021-06-21T09:59:39-04:00

Learn Social Engineering : My New Book

I am pleased to announce that my new book “Learn Social Engineering” has just been published. A book which covers  SocialEngineering from A to Z & contains case studies from the field, as well as expert opinions. (foreword by Troy Hunt) 

Improve information security by learning Social Engineering.

Key Features

  • Learn to implement information security using social engineering
  • Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on
  • Practical approach towards learning social engineering, for IT security

Book Description

This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates.

Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.

By the end of the book, you will be in a position to protect yourself and

your systems from social engineering threats and attacks.

All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts.

What you will learn

  • Learn to implement information security using social engineering
  • Learn social engineering for IT security
  • Understand the role of social media in social engineering
  • Get acquainted with Practical Human hacking skills
  • Learn to think like a social engineer
  • Learn to beat a social engineer
I would like to thank all the experts who have contributed in the book :
https://www.packtpub.com/networking-and-servers/learn-social-engineering
 
Troy Hunt creator of haveibeenpwned.com
Jonathan Trull Microsoft’s Global Chief Security Advisor
Yalkin Demirkaya the ex CISO of Bureau of New York Police Department
Mitko Bogdanoski key expert of European Union security projects 
Marcus Murray  Cybersecurity expert & VP of TrueSec
Hasain Alshakarti Cybersecurity Expert
Milad Aslaner Security Person at Microsoft
Paula Januszkiewicz  Cybersecurity Expert  & CEO of CQURE Inc.
Aryeh Goretsky Distinguished Researcher of ESET
Sami LaihoWindows & Security Expert
Şükrü Durmaz Forensics expert  & CEO of DIFOSE Akademi
Raymond P L Comvalius Multi Focused ICT specialist
Andy Malone (MVP MCT) World Class technology instructor & Author
Chris Jackson Windows Internals Expert  Microsoft
Ozan Uçar Founder and chief technologist at Keepnet Labs
Dan Weis Lead Penetration Tester at Kiandra IT
George Dobrea Chief Hacking Officer
Emre Tınaztepe , Founder and chief technologist at Zemana
Raif Sarica  Multi Focused ICT specialist
Leyla Aliyeva Head of Azer CERT
Oguzhan Filizlibay Microsoft Execute Security Advisor

About This Book

·Learn to implement information security using social engineering

·Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on

·Practical approach towards learning social engineering, for IT security

Who This Book Is For

This book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage

What You Will Learn

·Learn to implement information security using social engineering

·Learn social engineering for IT security

·Understand the role of social media in social engineering

·Get acquainted with Practical Human hacking skills

·Learn to think like a social engineer

·Learn to beat a social engineer

In Detail

This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates.

Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks, and the damages they cause. It then sets up the lab environment to use different tools and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.

By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks.

All in all, the book covers social engineering from A to Z , along with excerpts from many worldwide known security experts.

Style and approach

A step-by-step practical guide that will get you well acquainted with Social Engineering. You’ll be able to get started with it in a matter of minutes with the help of different tools such as the Social Engineering toolkit , Kali Linux and so on.

Kevin Mitnick recommends :

Today I have received an Feedback which made me very happy.

One of the very first known Social Engineer’ s or Worlds Most known hackers Kevin Mitnick is recommending my book “Learn Social Engineering” in his sessions , conferences as per this e-mail :

“Good Morning (or) Afternoon,  Dr…

Hope you are well in the middle of this pandemic. My name is Carleton Smith, a older online student currently undergoing online re-certification in Digital Forensics using the EdX platform taking classes at RIT (Rochester Institute of Technology under Dr. Johnathan Weissman) ~ Network Security.

I have been unable everywhere I’ve looked both online at Amazon, my local library online, interlibrary loan system throughout the USA, etc… to find your book  Learn Social Engineering ISBN:  978-1-78883-792-7 even in a .PDF version.

The reformed hacker, Kevin Mitnick, now a IT security consultant in Las Vegas, NV had spoken of your book recommending it  so I wanted to read it.  But again, finding a copy has been quite elusive so far.

Would you have even a .PDF summary of the “highlights” available maybe I could purchase?   I would be most grateful for any assistance and thank you in advance for your time today.

It’s a fascinating subject, isn’t it?  My current professor says one can easily” get quite lost” in it…

Once again, thank you, Sir. Have a most blessed day! 

Carleton Smith”

Cybersecurity Canon Candidate Book Review: Learn Social Engineering

https://www.erdalozkaya.com/cybersecurity-canon-candidate-book-review-learn-social-engineering/

 

Kevin Mitnick recommends Learn Social Engineering by Erdal Ozkaya

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

FINNOSEC AFRICA Dr Ozkaya

FINNOSEC AFRICA – Join my Keynote for Free 2020

FINNOSEC AFRICA, I am proud to announce that I will be delivering a Keynote at the FINNOSECAFRICA FINNOSEC AFRICA , THE FINANCIAL... read more
Cybersecurity - Attack and Defense Strategies - Second Edition

Cybersecurity Attack and Defense Strategies – 2nd Edition

Cybersecurity Attack and Defense Strategies - Second Edition: Counter modern threats and employ state-of-the-art tools and techniques to protect your... read more
API

WHAT IS AN ENDPOINT API? Free and Easy Gu1de

WHAT IS AN ENDPOINT API? Programs that need to interact with each other communicate through an Application Program Interface (API). The... read more
Feedback

Microsoft Ignite Feedback – Thankful <3

Microsoft Ignite Feedback Just WOW! Computer Hacked live..in span of 5 Seconds ? Yep, brave ! MSignite Twitter 247101 Erdal, Hasain, Marcus... read more
Titans Talk Show Erdal Ozkaya

The Titans Talk Show now in You Tube -watch f0r free

The Titans Talk Show "If you FEAR Change, Information Security is not your filed" The Titans Talk Show ,In Season 3,... read more
Worlds First CEH Erdal Ozkaya

Worlds First CEH v7 Class Delivery – Gain legendry skills

Worlds First Certified Ethical Hacker ... A Certified Ethical Hacker is a skilled professional who understands and knows how to look... read more

Effective cybersecurity strategies -Learn 4 Free

Effective cybersecurity strategies With cybercrime on the rise, companies have started adopting the hard ways of preventing system breaches. Cybersecurity has... read more
Combatting cybercriminals GISEC Erdal Ozkaya

Combatting cybercriminals banking on financial vulnerabilities : GISEC Free Event 2020

Combatting cybercriminals banking on financial vulnerabilities Unprecedented 238% spike reported in cyberattacks against banks and financial institutions from February to April... read more
trusted operating system

E-Mail Crimes and Violations – 1

E-Mail Crimes and Violations This post is written to give you a brief intro about E-Mail Crimes and Violations and how the leakage could... read more

Local DNS Hacking : Force your End Users to use “your site” Laugh at mates 1

Local DNS Hacking Force your End Users to use “your site” OK OK, this is not real hacking but it’s fun :) As well... read more

Categories

  • About Dr Erdal Ozkaya (300)
    • Awards (97)
    • Erdal in the news (121)
    • Feedback (88)
    • My Books (53)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (305)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (73)
  • Cybersecurity (325)
  • Cybersecurity Leadership (58)
  • Digital Transformation (2)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (166)
  • General (138)
  • How to …? (61)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (32)
    • Free E-Books (14)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Siber Güvenlik (17)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Sabri Kızmaz on Finans Sektörü Odaklı Siber Tatbikat
  • celal bayar on Finans Sektörü Odaklı Siber Tatbikat
  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.