Learn Social Engineering From Scratch

Course Feature
  • Cost
    Paid
  • Provider
    Udemy
  • Certificate
    Paid Certification
  • Language
    English
  • Start Date
    2023-01-13
  • Learners
    No Information
  • Duration
    No Information
  • Instructor
    Zaid Sabihz Security
Next Course
4.7
41,779 Ratings
This comprehensive course on Social Engineering will take you from a beginner to a high level hacker. You will learn how to install the needed software, gather information about your target, generate custom malware, deliver it to the target, and post exploitation. You will also learn how to bypass anti-virus programs and protect yourself from these attacks. With 24/7 support, you will be able to modify and combine techniques to come up with more powerful attacks.
Show All
Course Overview

❗The content presented here is sourced directly from Udemy platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.

Updated in [July 18th, 2023]

This comprehensive course on Social Engineering will take you from a beginner level to a high level of understanding. You will learn how to install the necessary software on Windows, Linux, and Mac OS X. You will also learn how to gather information about a target, generate malware, deliver it to the target, and post-exploit the target. You will learn how to bypass anti-virus programs, create fake websites, send emails, use fake login pages, and use fake updates. You will also learn how to protect yourself and your systems from these attacks. All the attacks in this course are practical and will work against real computers. With this course, you will get 24/7 support and a Course Completion Certification from Udemy.

Course Syllabus

Teaser - Hacking An Android Phone & Accessing The Camera

Preparation - Creating a Penetration Testing Lab

Preparation - Linux Basics

Information Gathering

Information Gathering - Gathering Info About A Company/Website

Information Gathering - Gathering Info About A Person

Windows Malware

Windows Malware - Generating Undetectable Backdoors

Windows Malware - Spying

Windows Malware - Enhancing Malware

Windows Malware - Creating Trojans

Mac OS X Malware

Linux Malware

Delivery Methods

Using The Above Attacks Outside The Local Network

Post Exploitation

Post Exploitation - Meterpreter

Post Exploitation - Empire

Security

Bonus Section

Show All
Pros & Cons
  • High quality course
  • Hands-on and real-life examples
  • Outdated examples and information
  • Lack of response and support
Show All
Recommended Courses
anti-phishing-and-email-security-training-4792
Anti Phishing and Email Security Training
4.2
Udemy 1,630 learners
Learn More
This Anti Phishing and Email Security Training course is perfect for anyone looking to learn the role of email security in the workplace and how to keep staff and the organisation protected. It covers GDPR implications, provides resources for employees and managers, and offers free support and demonstrations. This course is ideal for those who want to provide their employees with training, or are a manager looking for extra tips, resources and demos on email security. Learn how to keep your organisation safe and secure with this comprehensive course.
social-engineering-information-gathering-from-a-to-z-4793
Social Engineering (Information Gathering) from A to Z
4.4
Udemy 5,017 learners
Learn More
This course, Social Engineering (Information Gathering) from A to Z, is the perfect way to learn the process of collecting information from different sources about any individual, company, organization, server, IP address or person. It covers both theory and practical aspects, with step-by-step instructions and slides for taking notes. After completing the course, students will be familiar with how attackers gather various types of information before launching an attack. Quizzes are also included to evaluate learning skills. This course is ideal for anyone looking to gain knowledge on information gathering and social engineering.
breaching-the-perimeter-with-enterprise-phishing-4794
Breaching The Perimeter With Enterprise Phishing
4.6
Udemy 3,314 learners
Learn More
Are you looking to take your career in Information Security to the next level? Breaching The Perimeter With Enterprise Phishing is the perfect course for you! Developed by Silicon Valley Hackers, this 8+ hour course will teach you the skills required to land a job in Ethical Hacking. You will learn the attack chain for Next Generation Phishing, how to make scalable infrastructure in AWS, how to utilize Golden Images, Python Automation, Human Psychology for Phishing, how to bypass 2FA, beat Email Server Security, create & setup Domains & Emails correctly at scale and much more! With 24 hour support via Q/A and access to our Private Student Only Facebook Group with access to the instructors, you will be able to fill the gap in the ever growing field of Information Security. Don't wait, take your career to the next level with Breaching The Perimeter With Enterprise Phishing!
cyber-security-social-engineering-4795
Cyber Security Social Engineering
4.6
Udemy 2,481 learners
Learn More
This Cyber Security Social Engineering course will teach you the most common social engineering threats and how to protect yourself and your systems from them. You will learn how to think outside the box and understand the psychology of hackers, so you can form a protective shield against them. This course covers topics such as introduction to social engineering, sensitive vs social vs non sensitive information, types of social engineering, and a social engineering framework. By the end of the course, you will have a strong knowledge of social engineering and be able to protect yourself and your loved ones from these threats. Click now to learn more!
Favorites (0)
Favorites
0 favorite option

You have no favorites

Name delet