Skip to content
Menu
menu

Social Engineering and Technical Exploitation

$49 Member Price
$79 Nonmember Price

Technical exploitation comes down to four basics: patching, permissions, people, and physical. In a world rife with hackers and exploiters, malware and malice, understanding the influx of bad actors is important in establishing a secure operating environment. Learn the basics of technical exploitation and how hackers target and ultimately exploit vulnerable people and places. A technical background is helpful for grasping the details.  

This webinar is sponsored by the ASIS Information Technology Security Community. Registration is free for ITSC Members.

Learning Objectives

Upon completion, participants will be able to:

  • Attendees will learn to identity when being solicited for nefarious purposes.
  • Attendees will learn how systems are compromised through common techniques.
  • Attendees will be learn defensive techniques for identifying and countering social engineering.

Credit Information

Completion of this webinar is eligible for 1 CPE credit. CPE credits will be updated in your user profile within 48 hours of completion. Self-reporting of CPE credits is not required. 

Expand Your Learning!

ASIS joins the U.S. Department of Homeland Security and the E.U. Agency for Network and Information Security (ENISA) in recognizing October as Cybersecurity Awareness Month. In that vein, the Information Technology Security Community hosts several webinars addressing various cybersecurity topics to help you, your organization, and your communities stay safe online. For more cybersecurity resources, visit https://www.asisonline.org/cybersecurity.

Presenter

Matt James*

Apple, Inc.

Matt James is a seasoned security professional, having served in associated roles for more than 15 years. A combat-wounded veteran, Mr. James started his career in cybersecurity following his medical retirement from the U.S. Army. His experience spans the US Department of State to the US Army Special Operations Command, to civilian roles for ManTech, Frontier Communications, ID.me, and now Apple. He resides in the Austin, Texas area with his wife, where he continues supporting veteran and infosec initiatives.

*Note: Speakers and content are subject to change without notice.

Policies

Cancellation and Transfer Policy

For a full refund or transfer credit, written requests must be received by ASIS at least three business days before the start date of the program. Those received less than three days prior will be charged a $25 cancellation/transfer fee.

Transfers will be limited to a maximum of two per original registration. No refunds or transfers are made for requests received on or after the start date. Contact us or fax your request to ASIS Member Services at +1.703.519.6298.

Please note that online subscriptions and downloadable products are nonrefundable, nontransferable.

Webinar Subscription

Gain access to all live and on-demand webinars for 2020—a minimum of 20 programs on topics such as security operations, active assailant, ESRM, and management & leadership—for one low subscription fee. With content delivered by security experts who have proven expertise in their field, ASIS webinar content is relevant to the work you do as a practitioner every day. Build your security knowledge—or enable team training—by staying informed, efficiently and affordably. 

$149 member | $199 nonmember

arrow_upward