Module 1: Introduction to Social Engineering in Red Teaming
Module 2: Psychological Principles of Social Engineering
Module 3: Pretexting and Impersonation
Module 4: Phishing and Spear Phishing Attacks
Module 5: Vishing (Voice Phishing) and Impersonation
Module 6: Physical Social Engineering
Module 7: Elicitation and Information Gathering
Module 8: Psychological Manipulation and Detection
Module 9: Building Effective Social Engineering Campaigns
Overview of social engineering’s role in red teaming
Social engineering plays a critical role in Red Teaming by simulating real-world attacks that leverage psychological manipulation and human vulnerabilities