Prompt Engineering: Generative AI for Malware & Social Engineering

Generative AI    |    Intermediate
  • 12 videos | 1h 5m 13s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
In the dynamic digital landscape, cybersecurity is more important than ever. Malicious actors are well aware that people are often the weakest link in an organization's cybersecurity posture. Ethical hackers commit significant effort into penetration testing and strategizing to combat malware and social engineering efforts executed by threat actors. This course journeys deep into the techniques and methodologies employed by ethical hackers to uncover malware and educate users in the ongoing battle against social engineering and how generative artificial intelligence (AI) can assist them in this pursuit. You'll start by exploring the types of malware and social engineering principles and techniques. With this foundation, you'll explore how generative AI can be used to help detect malware and social engineering attacks. You'll discover potential damage that can result from such attacks along with countermeasures that can be taken and then you'll explore proactive efforts to train users about social engineering attacks. You'll investigate how to use generative AI and prompt engineering to counter malware and social engineering, and you'll proceed to explore how malware and social engineering evolve over time. Lastly, you'll examine some real-world case studies that feature malware and social engineering attacks.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the various types of malware including viruses, worms, trojans, and ransomware
    Outline the principles and techniques of social engineering
    Describe how to use generative ai to create convincing phishing emails
    Leverage prompt engineering to detect social engineering attacks
    Describe the potential damage caused by different types of malware and social engineering attacks
  • Describe different countermeasures against malware and social engineering attacks
    Outline how to educate users about the dangers of social engineering and the importance of training
    Perform a simulated social engineering attack and describe how to counter it
    Describe the evolution of malware and social engineering over time
    Describe real-world case studies involving malware and social engineering
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 26s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 13s
    After completing this video, you will be able to describe the various types of malware including viruses, worms, trojans, and ransomware. FREE ACCESS
  • Locked
    3.  Social Engineering
    6m 14s
    Upon completion of this video, you will be able to outline the principles and techniques of social engineering. FREE ACCESS
  • Locked
    4.  Generating Phishing Emails
    3m 37s
    Find out how to use generative AI to create convincing phishing emails. FREE ACCESS
  • Locked
    5.  Detecting Social Engineering Attacks
    3m 29s
    Discover how to leverage prompt engineering to detect social engineering attacks. FREE ACCESS
  • Locked
    6.  Potential Damage From Attack
    6m 5s
    After completing this video, you will be able to leverage prompt engineering to detect social engineering attacks. FREE ACCESS
  • Locked
    7.  Countermeasures Against Attack
    8m 40s
    Upon completion of this video, you will be able to describe different countermeasures against malware and social engineering attacks. FREE ACCESS
  • Locked
    8.  User Training on Social Engineering Attacks
    9m 9s
    After completing this video, you will be able to outline how to educate users about the dangers of social engineering and the importance of training. FREE ACCESS
  • Locked
    9.  Conducting a Social Engineering Attack
    5m 14s
    Learn how to perform a simulated social engineering attack and describe how to counter it. FREE ACCESS
  • Locked
    10.  The Evolution of Malware and Social Engineering
    7m 50s
    After completing this video, you will be able to describe the evolution of malware and social engineering over time. FREE ACCESS
  • Locked
    11.  Real-world Case Studies
    6m 25s
    Upon completion of this video, you will be able to describe real-world case studies involving malware and social engineering. FREE ACCESS
  • Locked
    12.  Course Summary
    51s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
Rating 4.6 of 18 users Rating 4.6 of 18 users (18)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 6009 users Rating 4.4 of 6009 users (6009)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)