Social Engineering Defense and Attack
Upskilling Course, 40 Academic Hours
Deep Dive: Social Engineering Methodologies, Tactics and Techniques
- Level: Intermediate
This course uncovers some of the most elegant and intelligent social engineering attacks. It provides advanced knowledge on social engineering methodologies, tactics and techniques, and provides exposure with common social engineering tools and technologies. Knowing how it’s done, you’d know better how to defend.
By enrolling in this course, you will develop key skills in identifying and countering social engineering tactics, a critical aspect of modern cybersecurity.
Who Is This Course For?
- Interested Public – Anyone looking for a better understanding of social engineering
- Incident responders, analysts and team leaders
- Senior SOC analysts
- System administrators
- Cybersecurity and IT teams
- CISOs
Prerequisite
- Basic experience in IT

Learning Objectives
- Detect and perform social engineering attacks
- Use social engineering tools
What You'll Get...
- Course presentation as a PDF file
- Cheat sheets and useful documentation
- “Swiss Army Knife” - 3Gb of IR tools
- 24.5 hours of practical learning experience through hands-on activities
- A Wawiwa certificate upon successful completion of the course
Professional Supervisor and Instructors
Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.

Nadav Nachmias
Head of Cybersecurity Programs

Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).

What Do Graduates Have to Say?

Course Syllabus
Module 1: Introduction (4 Theoretical Hours)
- Introduction
- The Social Engineer
- Exploitation Lifecycle
Module 2: Techniques (4 Theoretical Hours, 5 Practical Hours)
- Social Engineering Techniques
- Demos
- Kali Lab
- Dradis Lab
Module 3: Google Hacking (3 Theoretical Hours, 5 Practical Hours)
- Google Hacking
- Google Hacking Lab
- Maltego Lab
- Recon – NG Lab
Module 4: Targeting (4.5 Theoretical Hours, 6.5 Practical Hours)
- Targeting
- Toolkit Lab
- Cupp Lab
- Cewl Lab
- Shodan Lab
- Scythe Lab
- Creepy Lab
Module 5: Hands-On Marathon (8 Practical Hours)
- Detection and Prevention
- Advanced Social Engineering
Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.
Interested in more details?
We’d be happy to answer all your questions!