Christopher Hadnagy is the founder and CEO of Social-Engineer, LLC. During Chris’ 16 years in the information security industry, he created the world’s first social engineering framework and newsletter, as well as hosted the first social engineering based podcast.
Chris is also a well-known author, having written four books on social engineering. Chris’ new book, “Human Hacking: Win Friends, Influence People and Leave Them Better Off for Having Met You,” is available now.
Christopher Hadnagy is an Adjunct Professor of Social Engineering for the University of Arizona’s NSA designated Center of Academic Excellence in Cyber Operations (CAE-CO). He also lectures and teaches about social engineering around the globe. Moreover, he’s been invited to speak at the Pentagon, as well as other high-security facilities. Additionally, as the creator of the world’s first Social Engineering Capture the Flag (SECTF), Chris leads the way in educating people on this serious threat.
Chris works with some of the world’s leaders in scientific research for the purpose of acquiring a deeper understanding of social engineering. Notably, Chris authored a book with Dr. Paul Ekman regarding the use of nonverbal communication by social engineers.
Chris is certified as an Offensive Security Certified Professional (OSCP) as well as an Offensive Security Wireless Professional (OSWP). He is also the creator of the Social Engineering Pentest Professional (SEPP) and Master’s Level Social Engineering (MLSE) Certifications.
Workshop: SE Pentest Track
This three-day track takes you through the process of conducting 3 of the main aspects of a remote SE Pentest. Due to the nature of what we are doing during this class, there is very limited seating and this class is capped off at 25 people. Each day builds on the next so it is required to attend all three days, and is not a la carte.
Day 3: Phishing
Considered the most used and deadliest vector for all social engineering attacks, it is critical you understand all aspects of phishing.
You will learn:
- What is phishing?
- The psychology of phishing
- How to set up a corporate phishing program
- Using all the data from days 1 and 2 you will develop 4 levels of a single phish against your target
At the end of this course, those who graduate will be given a certificate of passing if they can accomplish all 3 days of work while remaining within the boundaries and the rules of the class