Prompt Engineering: Generative AI for Malware & Social Engineering
Generative AI
| Intermediate
- 12 videos | 1h 5m 13s
- Includes Assessment
- Earns a Badge
In the dynamic digital landscape, cybersecurity is more important than ever. Malicious actors are well aware that people are often the weakest link in an organization's cybersecurity posture. Ethical hackers commit significant effort into penetration testing and strategizing to combat malware and social engineering efforts executed by threat actors. This course journeys deep into the techniques and methodologies employed by ethical hackers to uncover malware and educate users in the ongoing battle against social engineering and how generative artificial intelligence (AI) can assist them in this pursuit. You'll start by exploring the types of malware and social engineering principles and techniques. With this foundation, you'll explore how generative AI can be used to help detect malware and social engineering attacks. You'll discover potential damage that can result from such attacks along with countermeasures that can be taken and then you'll explore proactive efforts to train users about social engineering attacks. You'll investigate how to use generative AI and prompt engineering to counter malware and social engineering, and you'll proceed to explore how malware and social engineering evolve over time. Lastly, you'll examine some real-world case studies that feature malware and social engineering attacks.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the various types of malware including viruses, worms, trojans, and ransomwareOutline the principles and techniques of social engineeringDescribe how to use generative ai to create convincing phishing emailsLeverage prompt engineering to detect social engineering attacksDescribe the potential damage caused by different types of malware and social engineering attacks
-
Describe different countermeasures against malware and social engineering attacksOutline how to educate users about the dangers of social engineering and the importance of trainingPerform a simulated social engineering attack and describe how to counter itDescribe the evolution of malware and social engineering over timeDescribe real-world case studies involving malware and social engineeringSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 26sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 13sAfter completing this video, you will be able to describe the various types of malware including viruses, worms, trojans, and ransomware. FREE ACCESS
-
6m 14sUpon completion of this video, you will be able to outline the principles and techniques of social engineering. FREE ACCESS
-
3m 37sFind out how to use generative AI to create convincing phishing emails. FREE ACCESS
-
3m 29sDiscover how to leverage prompt engineering to detect social engineering attacks. FREE ACCESS
-
6m 5sAfter completing this video, you will be able to leverage prompt engineering to detect social engineering attacks. FREE ACCESS
-
8m 40sUpon completion of this video, you will be able to describe different countermeasures against malware and social engineering attacks. FREE ACCESS
-
9m 9sAfter completing this video, you will be able to outline how to educate users about the dangers of social engineering and the importance of training. FREE ACCESS
-
5m 14sLearn how to perform a simulated social engineering attack and describe how to counter it. FREE ACCESS
-
7m 50sAfter completing this video, you will be able to describe the evolution of malware and social engineering over time. FREE ACCESS
-
6m 25sUpon completion of this video, you will be able to describe real-world case studies involving malware and social engineering. FREE ACCESS
-
51sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.