NEW Learn Google hacks, gather sensitive data and Phishing
3.9 (4 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
15 students enrolled

NEW Learn Google hacks, gather sensitive data and Phishing

Learn how to use Google to gather sensitive data, generate a Phishing website among many other subjects, enroll today.
3.9 (4 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
15 students enrolled
Created by Hackademy _
Last updated 4/2020
English
English [Auto-generated]
Current price: $62.99 Original price: $89.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1 hour on-demand video
  • 2 articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Gather sensitive information using Google among other tools
  • Google hacking and it's queries
  • How to explore a Data Breach and gather valuable information
  • Use Shodan and Binaryedge to list IOT devices
  • Configure and launch a Phishing website
Requirements
  • Student must know how to use Google (Duh!)
  • Import and run Kali Linux on VirtualBox
  • Network basic knowledge
Description

Google is a great tool that must of us use on a daily basis, however it's real power and capacities are hidden to the vast majority of us. Since it fetches data from all over the internet (or most of it) some sensitive data also stays available and can be gathered with a few custom search queries and a bit of imagination 

This course will not only teach you how use most of Google's full capacities, it will also show you how to use other search engines to fetch sensitive information and validate if credentials are compromised. Besides this you will learn how to setup a phishing attack website in order to get sensitive information by cloning websites such as Google's, Facebook, LinkedIn, etc and you will also learn how to setup a local fake WiFi access point to get users credentials, among other useful information.

You will also learn best practices to secure your information, detect and avoid phishing scams in order to best secure your data.

This course is meant to be practical, no boring slideshows or lectures, we will go straight to the point and start exploring the several tools right from the first lessons.

This course is for educational purposes only, I do not take any responsibility for your actions and you are highly advised not to use this information to perform any illicit actions.

Who this course is for:
  • Anyone with basic IT knowledge
  • Curious, enthusiasts, hackers, beginners ...
Course content
Expand all 17 lectures 01:13:06
+ Google hacks
7 lectures 26:56

Several web servers aren't configured correctly, folders that should be marked as private are indexed by Google and sensitive files get easily exposed, find out how easy it is.

Preview 04:27
Google hacking
03:37
Explore a website with Google
11:01

We have seen  how using Google alone we can have administrator access to a website, now let's learn how to secure it.

Techniques to secure websites
03:35
Test your skills
1 question

Yandex is the most used search engine in Russia, find out why.

Google alternatives
02:02
Finding media files
01:04

In this file you can find more Google queries in order to improve your data searches.

Updated Google hack queries
01:10
+ Sensitive data gathering
7 lectures 38:30

With this tools we can get a serie of information of users who work at a company or institution.

Kali Tools to gather data
07:14

Best practices to secure your digital data.

Protect your sensitive data
05:46

Data breaches databases contain several domains and user credentials, even if they are old they can give us sensitive information.

Data breaches - what they are
03:03

Find IOT devices connected to the internet using powerful search engines.

Preview 06:26
Test your skills
1 question
Social Engineering
04:38
How to perform phishing attacks
07:51

See how you can avoid phishing attacks, simple tips that will help you to secure your data and credentials.

Avoid phishing attacks
03:32
+ Conclusion
3 lectures 07:39

Thanks for making it to the end, doubts or questions ? send me a message and I will be glad to help.

Conclusion
00:29

Preview of "IT Security: Hacking and Networks Security - 2020" course that you can get with a special discount

Extra lesson
06:00
Information sources
01:10