Exam Essentials
Explain phishing techniques. List and explain how to conduct phishing techniques, including spear phishing, SMS phishing, voice phishing, and whaling. Understand common phishing practices and why individuals or specific populations might be targeted versus a large group or an entire organization.
Understand social engineering motivation techniques. Know when and how to apply common social engineering motivation techniques. Differentiate authority, scarcity, social proof, urgency, likeness, and fear-based approaches and when and why each can be useful. Explain why combining motivation techniques can be beneficial, and which techniques work together well.
Describe physical security attack methods. Describe physical facility penetration testing techniques, including how to perform a piggybacking attack, how a mantrap may prevent it, and alternative methods to bypass locked doors. Explain the role of lockpicking and lock bypass, as well as when badge cloning and exploiting...