Our Courses: Counter Elicitation
Counter Elicitation Techniques Training (2 days)
Investment: €1,000
Location: In-person or virtual
The Counter-Elicitation Techniques Training (CETT) course is a comprehensive training program focused on counter-elicitation, an essential defense mechanism against social engineering efforts.
This course equips participants with the skills needed to detect and defeat attempts at information extraction through subtle questioning & statements, rapport manipulation, and observation of non-verbal cues.
While covering the broader defensive strategies against social engineering, the program specifically dives into counter-elicitation methods and their application in both digital and physical realms. CETT is designed with the understanding that everyone has information they consider confidential and vital to protect. Recognizing that threats are not limited to security experts or business leaders, this course emphasizes
Upcoming course dates will be announced soon.
What You’ll Learn
A Primer on Elicitation
Recognizing Elicitation Methods
Building Awareness
Detecting Elicitation Attempts
Enhancing Listening Skills
Conversation Management Understanding and Interpreting Body Language
Counter-Elicitation Techniques
Strategies for Information Protection
Role-Playing and Practical Exercises
Applications of Counter-Elicitation in Various Contexts
Defending Against Social Engineering
Developing a Personal Security Mindset
Earn your counter-elicitation certificate.
Participants who have successfully completed the Counter-Elicitation Training Toolbox course and received their certification have demonstrated advanced skills in assessing and countering communication strategies used for information gathering.
Certified individuals have engaged in practical Counter-Elicitation scenarios where they showcased their ability to employ counter-elicitation and defensive social engineering techniques to manage and control information exchange. They have expertise in rapport manipulation, are adept at interpreting non-verbal signals, can identify elicitation techniques and have the capability to discern and protect against manipulative tactics aimed at extracting information.
"After completing the Elicitation Training Toolbox course, I recognized my vulnerability to elicitation tactics. The Counter Elicitation course has since boosted my confidence, equipping me to identify and avoid such techniques. This training has significantly enhanced my defensive capabilities in both professional and personal settings."
—Thomas L., C-level exec