Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

People Information Gathering with the Social Engineering Toolkit (SET)

Social Engineering is one of the most common attack vectors. Unfortunately, in this digital age, many people still fall victim to these attacks. In this course, you will learn Initial Access using the Social Engineering Toolkit.

Rishalin Pillay - Pluralsight course - People Information Gathering with the Social Engineering Toolkit (SET)
by Rishalin Pillay

What you'll learn

Social engineering assesses people, processes, and procedures by using attack vectors such as email, malicious wireless networks and more in the attempt to breach organizational safeguards. In this course, People Information Gathering with the Social Engineering Toolkit (SET), you will cover how to utilize the Social Engineer Toolkit for Initial Access in a red team environment. First, you will demonstrate the ability to craft social engineering attacks such as spear phishing using various payloads. Next, you will work with other attack vectors within the Social Engineer Toolkit which relates to malicious payloads and integration into Metasploit. Finally, you will be able to simulate a social engineering attack. When you are finished with this course, you will have the skills and knowledge to execute these techniques these techniques: Conduct Social Engineering (T1268) and Spearphishing for information (T1397) using the Social Engineer Toolkit.

Table of contents

About the author

Rishalin Pillay - Pluralsight course - People Information Gathering with the Social Engineering Toolkit (SET)
Rishalin Pillay

Rishalin Pillay has over 12 years of cybersecurity experience and has acquired a vast amount of skills consulting for Fortune 500 companies while taking part in projects performing tasks in network security design, implementation, and vulnerability analysis. He holds many certifications that demonstrate his knowledge and expertise in the cybersecurity field. He is an author and content contributor to a number of books.

More Courses by Rishalin