Home Search Profile

Ultimate Defense Against AI-Powered Social Engineering (2024)

Focused View

5:20:32

  • 1 -00 Course Intro.pdf
  • 1 -Course Introduction.mp4
    04:20
  • 1 -01 Fundamentals - 00 Module Intro.pdf
  • 1 -Module Intro.mp4
    03:31
  • 2 -01 Fundamentals - 01 Fundamentals of Generative AI.pdf
  • 2 -Fundamentals of Generative AI.mp4
    14:30
  • 3 -01 Fundamentals - 02 Fundamentals of Social Engineering.pdf
  • 3 -Fundamentals of Social Engineering.mp4
    18:14
  • 4 -01 Fundamentals - 03 Social Engineering with Generative AI.pdf
  • 4 -Social Engineering with Generative AI.mp4
    24:21
  • 5 -01 Fundamentals - 04 Module Outro.pdf
  • 5 -Module Outro.mp4
    02:25
  • 1 -02 Social Engineering Mediums - 00 Module Intro.pdf
  • 1 -Module Intro.mp4
    03:36
  • 2 -02 Social Engineering Mediums - 01 Overview.pdf
  • 2 -Overview.mp4
    14:15
  • 3 -02 Social Engineering Mediums - 02 Text.pdf
  • 3 -Text.mp4
    13:53
  • 4 -02 Social Engineering Mediums - 03 Image.pdf
  • 4 -Image.mp4
    19:08
  • 5 -02 Social Engineering Mediums - 04 Audio.pdf
  • 5 -Audio.mp4
    14:43
  • 6 -02 Social Engineering Mediums - 05 Video.pdf
  • 6 -Video.mp4
    15:27
  • 7 -02 Social Engineering Mediums - 06 Module Outro.pdf
  • 7 -Module Outro.mp4
    02:28
  • 1 -03 Social Engineering Approaches - 00 Module Intro.pdf
  • 1 -Module Intro.mp4
    03:48
  • 2 -03 Social Engineering Approaches - 01 Advanced Impersonation.pdf
  • 2 -Advanced Impersonation.mp4
    11:58
  • 3 -03 Social Engineering Approaches - 02 Hyper-Personalisation.pdf
  • 3 -Hyper-Personalisation.mp4
    15:55
  • 4 -03 Social Engineering Approaches - 03 Emotional Manipulation.pdf
  • 4 -Emotional Manipulation.mp4
    15:25
  • 5 -03 Social Engineering Approaches - 04 Advanced Pretexting.pdf
  • 5 -Advanced Pretexting.mp4
    13:05
  • 6 -03 Social Engineering Approaches - 05 Automated Scalable Attacks.pdf
  • 6 -AutomatedScalable Attacks.mp4
    13:27
  • 7 -03 Social Engineering Approaches - 06 Module Outro.pdf
  • 7 -Module Outro.mp4
    02:40
  • 1 -04 Defensive Strategies - 00 Module Intro.pdf
  • 1 -Module Intro.mp4
    03:51
  • 2 -04 Defensive Strategies - 01 Awareness and Training.pdf
  • 3 -04 Defensive Strategies - 02 Text Corroboration.pdf
  • 3 -Text Corroboration.mp4
    11:31
  • 4 -04 Defensive Strategies - 03 Mannerism Analysis.pdf
  • 4 -Mannerism Analysis.mp4
    13:05
  • 5 -04 Defensive Strategies - 04 Identity Verification.pdf
  • 5 -Identity Verification.mp4
    10:35
  • 6 -04 Defensive Strategies - 05 Technological Defenses.pdf
  • 6 -Technological Defenses.mp4
    09:45
  • 7 -04 Defensive Strategies - 06 Policies and Culture.pdf
  • 8 -04 Defensive Strategies - 07 Module Outro.pdf
  • 8 -Module Outro.mp4
    02:50
  • 1 -05 Organisational Integration - 00 Module Intro.pdf
  • 1 -Module Intro.mp4
    03:05
  • 2 -05 Organisational Integration - 01 Changes Due to Generative AI.pdf
  • 2 -Changes Due to Generative AI.mp4
    11:27
  • 3 -05 Organisational Integration - 02 Detecting and Triaging Attacks.pdf
  • 3 -Detecting and Triaging Attacks.mp4
    10:30
  • 4 -05 Organisational Integration - 03 Responding and Recovering.pdf
  • 4 -Responding and Recovering.mp4
    11:47
  • 5 -05 Organisational Integration - 04 Module Outro.pdf
  • 5 -Module Outro.mp4
    02:16
  • 1 -06 Course Outro.pdf
  • 1 -Course Outro.mp4
    02:41
  • More details


    Course Overview

    This comprehensive course equips professionals with cutting-edge strategies to detect and defend against sophisticated social engineering attacks powered by generative AI, including deepfakes, hyper-personalized phishing, and automated scams.

    What You'll Learn

    • How to identify AI-generated synthetic content across text, audio, and video
    • Advanced techniques to prevent hyper-personalized phishing attacks
    • Implementing organizational defenses against next-gen social engineering

    Who This Is For

    • Cybersecurity engineers focused on phishing prevention
    • Data privacy professionals securing organizational assets
    • Employees seeking protection against AI-driven scams

    Key Benefits

    • Master detection of deepfakes and AI-generated content
    • Develop proactive defense strategies against emerging threats
    • Integrate AI-aware security protocols into existing systems

    Curriculum Highlights

    1. Fundamentals of Generative AI & Social Engineering
    2. AI-powered Attack Mediums (Text/Image/Audio/Video)
    3. Defensive Strategies & Organizational Integration
    Focused display
    • language english
    • Training sessions 32
    • duration 5:20:32
    • English subtitles has
    • Release Date 2025/06/11