
In this workshop, we are taking a “defense through offense” approach to illuminating the principles and techniques adversaries use to trick humans into helping them achieve their goals.
Live Training $25 - $150
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date: August 14th, 2025 @ 11:00 AM EDT
Description
It’s 2025, and social engineering attacks are as common as ever before. As organizations continue to lock down their technical controls, attackers must look for new avenues of least resistance to exploit. Often this can be as simple as asking for a password reset.
In this workshop, we are taking a “defense through offense” approach to illuminating the principles and techniques adversaries use to trick humans into helping them achieve their goals. By thinking like the attackers, we can be better prepared to recognize these situations and respond appropriately.
This workshop goes beyond the “what” of social engineering attacks and dives deep into the how and why they work. While this set of skills can be used maliciously, it can also be applied to make you a more attentive conversationalist and have more meaningful interactions with others.
After all, InfoSec is about people, not computers.
Syllabus
- Social Engineering Introduction
- How do we define SE
- What role does it play in modern compromises
- What traits make someone a successful social engineer
- OSINT for social engineering
- What information is most useful to a social engineer
- Where is this information found
- Discuss why such information cannot be used by defenders for security mechanisms
- Breakdown of the tactics of influence
- Taking control of the narrative
- Examples of the tactics in use
- Creation of pretexts
- How to use stereotypes and environmental factors to our advantage
- What can make or break a ruse
- Applying the principles of influence to your chosen pretext
- De-escalation Tactics
- Discuss how to handle people who are scared or angry
- Recognize when a situation is going wrong
- Defensive Notes
- Minimizing opportunities for social engineering via policies and culture
- Maintaining relationships pre/post engagement when you’re the bad guy
FAQ
● Prerequisites include an open-mind and a positive attitude.
About the Instructor

Cameron Cartier
Bio
Cameron Cartier joined Black Hills Information Security in 2023 as a Security Analyst. In this role, she hacks things, teaches things, and researches things of all sorts. Cameron loves the friendly collaborative environment; she gets to do cool things with cool people and get paid for it. She is a graduate student researching privacy-enhancing technologies. Outside of work, Cameron enjoys jiu-jitsu, gardening, hanging with friends, and adventuring in the mountains.
Register for Upcoming
-
Filter by Product Date
-
Filter by Product Instructor
-
Filter by Product Type
Workshop: The Hitchhiker's Guide To Social Engineering with Cameron Cartier
Complete Package
Live Training Cameron Cartier
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Cameron Cartier
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Cameron Cartier
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Cameron Cartier
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Cameron Cartier
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Similar Courses
-
Multiple InstructorsLive
Workshop: Exploiting AI with Ben Bowman
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: The OWASP API Security Top Ten 2023 with Tanya Janca
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Foundational Application Security Training with Bill McCauley
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: How to Befriend and Bedazzle Online Threat Actors with Tim Pappa
View Course This product has multiple variants. The options may be chosen on the product page