Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Under the Influence - The Dark Side of Influence

via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the dark side of influence and social engineering in this 54-minute conference talk from Converge 2015. Delve into topics such as the identity paradox, risk management, and how to stop hackers. Learn about the concept of "unfluence" and the Office of No. Examine ideas from Bruce Schneier on randomness and access intent knowledge. Understand buffer overflow attacks, both technical and human. Discover the power of embedding stories and observation techniques. Study risk assessment methodologies, including Jack Jones' risk equation and risk management steps. Gain insights into pretext creation, rapport building, and effective communication strategies for security professionals. Analyze the impact of social media platforms like Twitter on influence and security. Conclude with a discussion on trading programs and their relevance to information security.

Syllabus

Intro
The Identity Paradox
Risk Management Social Engineering
How to Stop Hackers
Unfluence
Office of No
Schneier and Random
Access Intent Knowledge
Buffer Overflow
Human Buffer Overflow
Embedding Stories
Dale Carnegie
Johnny Long
Power of Observation
Risk
Jack Jones
Risk Equation
Risk Management Steps
Risk Framework
Loss Event Frequency
pretexting
how to build rapport
what I tell security folks
eye contact
Twitter
Trading Program

Reviews

Start your review of Under the Influence - The Dark Side of Influence

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.