

{"id":3151,"date":"2022-12-19T06:45:38","date_gmt":"2022-12-19T11:45:38","guid":{"rendered":"https:\/\/sites.temple.edu\/care\/?page_id=3151"},"modified":"2022-12-19T07:01:06","modified_gmt":"2022-12-19T12:01:06","slug":"resources","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/care\/social-engineering\/resources\/","title":{"rendered":"Social engineering resources"},"content":{"rendered":"<p><strong>Books<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/www.amazon.com\/Its-Not-All-About-Techniques\/dp\/057809665X\/\" target=\"_blank\" rel=\"noopener\">Techniques for Building Quick Rapport with Anyone<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Sizing-People-Up-Behavior-Prediction\/dp\/0525540431\/\" target=\"_blank\" rel=\"noopener\">Sizing People Up: A Veteran FBI Agent&#8217;s User Manual for Behavior Prediction<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Human-Hacking-Friends-Influence-People\/dp\/0063001780\" target=\"_blank\" rel=\"noopener\">Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Influence-Psychology-Persuasion-Robert-Cialdini\/dp\/006124189X\" target=\"_blank\" rel=\"noopener\">Influence: The Psychology of Persuasion<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Open-Source-Intelligence-Techniques-Information\/dp\/1530508908\" target=\"_blank\" rel=\"noopener\">Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Yes-Scientifically-Proven-Ways-Persuasive\/dp\/1416576142\/\" target=\"_blank\" rel=\"noopener\">Yes!: 50 Scientifically Proven Ways to Be Persuasive<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Psychology-Persuasion-Persuade-Others-Thinking\/dp\/1565541464\/\" target=\"_blank\" rel=\"noopener\">The Psychology of Persuasion: How To Persuade Others To Your Way Of Thinking<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Google-Hacking-Penetration-Testers-Third\/dp\/0128029641\/\" target=\"_blank\" rel=\"noopener\">Google Hacking for Penetration Testers<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/dp\/B0071NOJ9W\/ref=sspa_dk_detail_0?psc=1\" target=\"_blank\" rel=\"noopener\">Spy the Lie: Former CIA Officers Teach You How to Detect Deception<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Definitive-Book-Body-Language-Expressions-ebook\/dp\/B000SEH9QG\/\" target=\"_blank\" rel=\"noopener\">The Definitive Book of Body Language: The Hidden Meaning Behind People&#8217;s Gestures and Expressions<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/What-Every-BODY-Saying-Speed-Reading\/dp\/0061438294\/\" target=\"_blank\" rel=\"noopener\">What Every Body Is Saying: An Ex-FBI Agent&#8217;s Guide to Speed-Reading People<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Confessions-Master-Jewel-Thief-Mason\/dp\/0375508392\/\" target=\"_blank\" rel=\"noopener\">Confessions of a Master Jewel Thief<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Physical-Security-Principles-ASIS-International\/dp\/1934904619\/\" target=\"_blank\" rel=\"noopener\">Physical Security Principles<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/dp\/1608194809\/\" target=\"_blank\" rel=\"noopener\">The Secret Life of Pronouns: What Our Words Say About Us<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Thinking-Fast-Slow-Daniel-Kahneman\/dp\/0374533555\/\" target=\"_blank\" rel=\"noopener\">Thinking, Fast and Slow<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Methods-Persuasion-Psychology-Influence-Behavior\/dp\/0615815650\/\" target=\"_blank\" rel=\"noopener\">Methods of Persuasion: How to Use Psychology to Influence Human Behavior<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Getting-Yes-Negotiating-Agreement-Without\/dp\/0143118757\" target=\"_blank\" rel=\"noopener\">Getting to Yes: Negotiating Agreement Without Giving In<\/a><\/li>\n<li><a href=\"https:\/\/www.amazon.com\/Secrets-Cold-Call-Success-Business\/dp\/1735039608\/\" target=\"_blank\" rel=\"noopener\">The Secrets to Cold Call Success: Close More Business in Less Time Than Ever Before<\/a><\/li>\n<li><a href=\"https:\/\/www.tribeofhackers.com\/\" target=\"_blank\" rel=\"noopener\">The Tribe of Hackers<\/a><\/li>\n<\/ol>\n<p><strong>Podcasts<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/layer8conference.com\/the-layer-8-podcast\/\" target=\"_blank\" rel=\"noopener\">Layer8 Podcast<\/a><\/li>\n<li><a href=\"https:\/\/darknetdiaries.com\/\" target=\"_blank\" rel=\"noopener\">Darknet Diaries<\/a><\/li>\n<li><a href=\"https:\/\/www.social-engineer.org\/podcasts\/\" target=\"_blank\" rel=\"noopener\">Social-Engineer Podcast<\/a><\/li>\n<li><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/hackers-podcast\/id1066024109\" target=\"_blank\" rel=\"noopener\">Hackers Podcast<\/a><\/li>\n<li><a href=\"https:\/\/thecyberwire.com\/podcasts\/hacking-humans\" target=\"_blank\" rel=\"noopener\">Hacking Humans Podcast<\/a><\/li>\n<li><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/the-privacy-security-osint-show\/id1165843330\" target=\"_blank\" rel=\"noopener\">The Privacy, Security, &amp; OSINT Show<\/a><\/li>\n<\/ol>\n<p><strong>Videos<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=MAB6pgmBf3k\" target=\"_blank\" rel=\"noopener\">How to Phish webinar by Chris Kirsch<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=ZNugPWy5Hok\" target=\"_blank\" rel=\"noopener\">How to OSINT webinar by Chris Kirsch<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=tb67HGyFBYk\" target=\"_blank\" rel=\"noopener\">How to Vish webinar by Alethe Denis<\/a><\/li>\n<\/ol>\n<p><strong>Websites<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/sites.temple.edu\/socialengineering\/\" target=\"_blank\" rel=\"noopener\">Social Engineering Competition<\/a><\/li>\n<li><a href=\"https:\/\/osintcurio.us\/\" target=\"_blank\" rel=\"noopener\">OSINTCurio.us<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Books Techniques for Building Quick Rapport with Anyone Sizing People Up: A Veteran FBI Agent&#8217;s User Manual for Behavior Prediction Human Hacking: Win Friends, Influence&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.temple.edu\/care\/social-engineering\/resources\/\">Continue reading<span class=\"screen-reader-text\">Social engineering resources<\/span><\/a><\/div>\n","protected":false},"author":2224,"featured_media":0,"parent":2765,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-3151","page","type-page","status-publish","hentry","entry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/3151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/users\/2224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/comments?post=3151"}],"version-history":[{"count":0,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/3151\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/2765"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/media?parent=3151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}