Module 1: Introduction to Social Engineering in Red Teaming
Module 2: Psychological Principles of Social Engineering
Module 3: Pretexting and Impersonation
Module 4: Phishing and Spear Phishing Attacks
Module 5: Vishing (Voice Phishing) and Impersonation
Module 6: Physical Social Engineering
Module 7: Elicitation and Information Gathering
Module 8: Psychological Manipulation and Detection
Module 9: Building Effective Social Engineering Campaigns
Leveraging impersonation to gain trust
Leveraging impersonation to gain trust is a tactic often used in social engineering, red teaming, and various forms of deception.