Social Engineering Defense and Attack

Upskilling Course, 40 Academic Hours

Deep Dive: Social Engineering Methodologies, Tactics and Techniques

This course uncovers some of the most elegant and intelligent social engineering attacks. It provides advanced knowledge on social engineering methodologies, tactics and techniques, and provides exposure with common social engineering tools and technologies. Knowing how it’s done, you’d know better how to defend.

By enrolling in this course, you will develop key skills in identifying and countering social engineering tactics, a critical aspect of modern cybersecurity.

Who Is This Course For?

  • Interested Public – Anyone looking for a better understanding of social engineering
  • Incident responders, analysts and team leaders 
  • Senior SOC analysts 
  • System administrators 
  • Cybersecurity and IT teams
  • CISOs


  • Basic experience in IT

Learning Objectives

  • Detect and perform social engineering attacks 
  • Use social engineering tools

What You'll Get...

Professional Supervisor and Instructors

Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias Head of Cybersecurity Programs

Nadav Nachmias

Head of Cybersecurity Programs

Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).

What Do Graduates Have to Say?

Course Syllabus

Module 1: Introduction (4 Theoretical Hours)

  • Introduction 
  • The Social Engineer 
  • Exploitation Lifecycle

Module 2: Techniques (4 Theoretical Hours, 5 Practical Hours)

  • Social Engineering Techniques 
  • Demos 
  • Kali Lab 
  • Dradis Lab

Module 3: Google Hacking (3 Theoretical Hours, 5 Practical Hours)

  • Google Hacking 
  • Google Hacking Lab 
  • Maltego Lab 
  • Recon – NG Lab

Module 4: Targeting (4.5 Theoretical Hours, 6.5 Practical Hours)

  • Targeting 
  • Toolkit Lab 
  • Cupp Lab 
  • Cewl Lab 
  • Shodan Lab 
  • Scythe Lab 
  • Creepy Lab

Module 5: Hands-On Marathon (8 Practical Hours)

  • Detection and Prevention 
  • Advanced Social Engineering

Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.

Interested in more details?

We’d be happy to answer all your questions!

Partner with Wawiwa to offer tech training programs in less than 6 months!

Wawiwa bridges the tech skills gap by reskilling people for tech professions in high demand. There are millions of tech vacancies and not enough tech professionals with the relevant knowledge and skills to fill them. What the industry needs of employees is not taught in long academic degrees. Wawiwa helps partners around the world to reskill, and upskill people for tech jobs through local tech training centers or programs. The company utilizes a proven training methodology, cutting-edge content, digital platforms for learning and assessment, and strong industry relations, to deliver training programs that result in higher employability and graduate satisfaction. This, in turn, also creates a strong training brand and a sustainable business for Wawiwa’s partners.