Compare and contrast different types of social engineering techniques.
Resources:
See Powerpoint Presentations: 1.1.3 – Dumpster Diving.pptx, 1.1.4 – Shoulder Surfing.pptx and Case Study – Dumpster Diving.pdf
Assignment:
Read the 1.1.3 – Dumpster Diving.pptx presentation. This lesson will introduce you to a form of information harvesting that involves digging through literal trash.
Read the 1.1.4 – Shoulder Surfing.pptx presentation. This lesson will introduce you to a form of information harvesting that should make you a little more aware of who’s behind you while you’re entering sensitive information into a form or field.
Begin reading the Case Study – Dumpster Diving.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the day on Tuesday, December 13th.
Assigned: December 12th, 2022 Teacher Pacing Due Date: December 13th, 2022
Compare and contrast different types of social engineering techniques.
Resources:
See PowerPoint presentations: 1.1.2 – Phishing and Spam.pptx, Lab – Phishing.pptx
Assignment:
Begin reading the 1.1.2 – Phishing and Spam.pptx presentation. This lesson will provide you with an overview of phishing methods.
Next, begin the Lab – Phishing.pptx lab. Use the phishery tool to conduct a Phishing attack, and note the difference between the Credential Harvesting method conducted in our last class session and the development and deployment of a Phishing email message with the intent to “hook” a victim.
Play the victim, and upload a screenshot of the successful attack screen with the “New credentials harvested!” message to today’s Google Classroom assignment post to confirm completion of the lab.
Assigned: December 9th, 2022 Teacher Pacing Due Date: December 12th, 2022
Compare and contrast different types of social engineering techniques.
Resources:
See Powerpoint Presentations: 1.1.3 – Dumpster Diving.pptx, 1.1.4 – Shoulder Surfing.pptx and Case Study – Dumpster Diving.pdf
Assignment:
Read the 1.1.3 – Dumpster Diving.pptx presentation. This lesson will introduce you to a form of information harvesting that involves digging through literal trash.
Read the 1.1.4 – Shoulder Surfing.pptx presentation. This lesson will introduce you to a form of information harvesting that should make you a little more aware of who’s behind you while you’re entering sensitive information into a form or field.
Begin reading the Case Study – Dumpster Diving.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the day on Thursday, December 9th.
Assigned: December 7th, 2021 Teacher Pacing Due Date: December 9th, 2021
Compare and contrast different types of social engineering techniques.
Resources:
See PowerPoint presentations: 1.1.2 – Phishing and Spam.pptx, Lab – Phishing.pptx
Assignment:
Begin reading the 1.1.2 – Phishing and Spam.pptx presentation. This lesson will provide you with an overview of phishing methods.
Next, begin the Lab – Phishing.pptx lab. Use the phishery tool to conduct a Phishing attack, and note the difference between the Credential Harvesting method conducted in our last class session and the development and deployment of a Phishing email message with the intent to “hook” a victim.
Play the victim, and upload a screenshot of the successful attack screen with the “New credentials harvested!” message to today’s Google Classroom assignment post to confirm completion of the lab.
Assigned: December 2nd, 2021 Teacher Pacing Due Date: December 6th, 2021
Compare and contrast different types of social engineering techniques.
Resources:
See PowerPoint presentations: 1.1.8 Credential Harvesting.pptx, Lab – Credential Harvesting
Assignment:
Begin reading the 1.1.8 Credential Harvesting.pptx presentation. This lesson will introduce you to social engineering-based attacks designed to acquire login credentials from victims.
Next, begin the Lab – Credential Harvesting.pptx lab.Use the Social Engineering Toolkit to launch a phishing attack.
Play the victim, and upload a screenshot of the successful attack screen with the “GOT A HIT!” message to today’s Google Classroom assignment post to confirm completion of the lab.
Assigned: November 30th, 2021 Teacher Pacing Due Date: December 2nd, 2021