Skip to main content
Inc. Updates

Announcing the 2016 Social Engineering Training Schedule

By September 21, 2015No Comments

2015 has proven to be a fantastic year for Social-Engineer’s wildly popular and ever growing training courses as we’ve garnered over 300 attendees worldwide!  Here’s what’s changed so far, and what’s to come as we roll toward 2016!

Untitled

Social engineering has been, and continues to be, the prevailing cause of many high-profile corporate breaches.  As the premier social engineering experts and armed with in-depth experience from the social engineering frontline, we’ve crafted our offerings to provide even more comprehensive and specialized training for 2016.

This week, DerbyCon 2015 marks our first public offering of the new Advanced Open Source Intelligence (OSINT) for Social Engineers training course. Are you interested in learning how to dredge deep into the Internet for hidden or hard to find information on targets? If you’re a red-teamer, security researcher, pentester, social engineer, or security enthusiast looking to leverage intelligence for both technical and non-technical investigations, this course is for you! While Derbycon 2015 is sold out, we’re bringing this training into rotation for 2016 to equip attendees with the knowledge and tools for ethical intelligence gathering that will assist with any type of research.

More good news: we will continue to offer our flagship Advanced Practical Social Engineering (APSE) Training Course in 2016. This course, however, will only be offered three times this year, so be sure to reserve your seat in advance! As always, the APSE course will include cutting-edge research and techniques based on both psychology and social engineering attacks we’ve discovered in the wild.  Attendees will walk away with a firm understanding of how non-technical skills can be optimized to bypass technical controls.

And for those of you who have already attended our APSE training course, we’re excited to unveil our NEW Masters Level Social Engineering training course in February 2016! This course, available only to graduates of the APSE, will take social engineering training to the next level with immersion into a full-scale social engineering penetration test.  Participants will have the opportunity to apply what they’ve learned about three pillars of social engineering: phishing, fishing, and impersonation during a live engagement.  As the only performance-based social engineering course offered to the public, this course will be offered once a year.

The full 2016 training schedule is below.

Please note: If you or your team are interested but unable to attend our social engineering training courses, contact us to discuss a private training catered to fit the specific needs of your organization.

DATE LOCATION COURSE
February 1-5, 2016 Orlando, FL Advanced Practical Social Engineering (APSE)
February 16-17, 2016 Orlando, FL Advanced OSINT for Social Engineers
February 29-March 3, 2016 Orlando, FL Masters Level Social Engineering
May 23-27, 2016 Bristol, UK Advanced Practical Social Engineering
August, 2016 Las Vegas,  NV Advanced Practical Social Engineering (APSE)
September, 2016 Louisville, KY Advanced OSINT for Social Engineers
November 3-4, 2016 Dallas, TX Advanced OSINT for Social Engineers

Leave a Reply

Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.