The Knowledge Academy

Social Engineering Training - Hong Kong

Enroll Now

Course Information

  • 10 Dec 2021 (Fri) 9:00 AM - 5:00 PM
  • 14 Jan 2022 (Fri) 9:00 AM - 5:00 PM
  • 28 Jan 2022 (Fri) 9:00 AM - 5:00 PM
  • 11 Feb 2022 (Fri) 12:00 AM - 5:00 PM
Registration period
22 Oct 2021 (Fri) - 10 Feb 2022 (Thu)
HKD 11,395
Course Level
Study Mode
1 Day(s)

Course Overview

Who should attend?

Anyone who wishes to enhance their knowledge of social engineering can attend this course. Professionals who wish to learn how to secure systems from social engineering attacks can also attend this course.


There are no formal prerequisites for this course.

Social Engineering Training Course Overview

Social engineering refers to the art of manipulating people to gain access to confidential data for fraudulent purposes. It is a term used for a wide range of malicious activities accomplished through human interactions.

Because social engineering relies on human error rather than vulnerabilities in software and operating systems, it requires a different approach to traditional network security.

This Social Engineering course is designed to provide knowledge to defend against social engineering tricks. During this training, delegates will learn about various influencing techniques including reciprocity, scarcity, and likability.

They will also become familiarised with common elicitation techniques, as well as pretexting. By the end of the course, you will understand the various computer-based and physical tools of social engineering, including the Social Engineering Toolkit (SET).

What’s Included

  • The Knowledge Academy’s Social Engineering Training Manual
  • Experienced Instructor
  • Completion Certificate


What You’ll Learn

Social Engineering Training Course Outline

Introduction to Social Engineering

Social Engineering Types

  • Email
  • Telephone
  • Baiting
  • Fax
  • Pretexting

Influencing Techniques

Overview of Elicitation

  • Flattery
  • False Statements
  • Artificial Ignorance
  • Sounding Board
  • Bracketing
  • Confidential Baiting

Basics of Pretexting

  • Research and Planning
  • Legal Considerations
  • Body Language

Information Gathering Basics

  • Information Organisation Overview
  • Dradis Framework
  • Sources of Information

Computer-Based and Physical Tools

  • Kali Linux
  • Social Engineering Toolkit (SET)
  • Metasploit Framework
  • Maltego
  • Cameras and GPS
  • Telephone and Lock Picking



Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed