Social Engineering: The Art of Human Hacking
Written by Christopher Hadnagy and Paul Wilson
Narrated by A. T. Chandler
4.5/5
()
About this audiobook
Christopher Hadnagy
Christopher Hadnagy is a global security expert and master hacker. He is the founder and CEO of Social-Engineer, LLC, the creator of the popular Social Engineer Podcast, website, and newsletter, and designed “Advanced Practical Social Engineering,” the first hands-on social engineering training course and certification for law enforcement, military, and private sector professionals. He is also the first (adjunct) professor of social engineering for the University of Arizona, one of the NSA-designated Centers of Academic Excellence in Cyber Operations. Hadnagy is the creator of the Human Hacking Conference, an annual conference focused on training people who to hack themselves to achieve their goals. A highly sought-after writer and speaker, he has spoken at events such as RSA and Black Hat and given numerous presentations for corporate, government, and military clients. He is the bestselling author of four technical books for security professionals: Social Engineering: The Art of Human Hacking; Unmasking the Social Engineer: The Human Element of Security; Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails; and Social Engineering: The Science of Human Hacking, which is now in its second edition. He is also the founder, executive director, and board member of the Innocent Lives Foundation, a nonprofit that fights the sexual abuse of children.
More audiobooks from Christopher Hadnagy
Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5
Related to Social Engineering
Related audiobooks
Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien" Rating: 4 out of 5 stars4/5How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish Without a Trace Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5HACKING: Social Engineering Attacks, Techniques & Prevention Rating: 5 out of 5 stars5/5Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5Red Team: How to Succeed By Thinking Like the Enemy Rating: 4 out of 5 stars4/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsFacing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5HACKING: 3 BOOKS IN 1 Rating: 5 out of 5 stars5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Trojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5Anonymize Yourself Rating: 4 out of 5 stars4/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Cybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 4 out of 5 stars4/5Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5
Security For You
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsHACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsCISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Breached!: Why Data Security Law Fails and How to Improve It: 1st Edition Rating: 5 out of 5 stars5/5
Reviews for Social Engineering
3 ratings1 review
- Rating: 5 out of 5 stars5/5Extremely professional and at the same time easy to get in. Real masterpiece. Very good narrator. It's a brilliant in collection