Learn Social Engineering & Open-source Intelligence (OSINT)
4.2 (236 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,852 students enrolled

Learn Social Engineering & Open-source Intelligence (OSINT)

IT security is not just about firewalls or antiviruses, it is also about people.
4.2 (236 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,852 students enrolled
Created by Gabriel Avramescu
Last updated 8/2019
English
English [Auto]
Current price: $129.99 Original price: $199.99 Discount: 35% off
2 days left at this price!
30-Day Money-Back Guarantee
This course includes
  • 4.5 hours on-demand video
  • 2 articles
  • 12 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Understand what Social Engineering is and how users can be affected
  • Perform social engineering attacks using tools and techniques
Requirements
  • basic computer skills
  • basic web security and linux knowledge
Description

"Amateurs hack systems,professionals hack people." (Bruce Schneier)

In this course, meant for beginners with no previous knowledge about penetration testing or hacking, that will start with the basics of social engineering, and by end of it you'll be at an advanced level being able to hack into all major operating systems (windows, Android and so on), generate different types of trojans and deliver them using smart social engineering techniques. 

To completely understand computer security, it's vital to step outside the fence and to think outside the box. Computer security is not just about firewalls, Intrusion Prevention Systems or antiviruses. It's also about tricking people into doing whatever a hacker wishes, for their benefit. A secure system, network or infrastructure is also about informed people. That's it what about this course is all about. Knowing how easy is for a hacker to make a regular user to do something harmful for himself, even being aware that is making a bit mistake.

This course covers both theoretical and practical aspects and contains hands-on labs.

Learn how to get Facebook, Gmail iCloud, Linkedin password trough social engineering, create backdoors and get remote control.

This courses have demos and labs using Kali Linux.

Disclaimer: this course is intended for ethical hackers and those who want to protect against this kind of attacks. Those are only theoretical examples in a lab environment. Hacking is illegal without legal permission!

Who this course is for:
  • IT Security Engineers
  • IT passionates
  • Chef Security Officers
Course content
Expand all 33 lectures 04:19:58
+ Introduction
4 lectures 07:12

A few words about the author

Preview 00:30

In this video I will explain what the course is all about.

Preview 01:55

In this video I will show you different types of social engineering.

Preview 03:53
Join Our Online Classroom!
00:54
+ Information Gathering
4 lectures 44:29

In this video I will explain the difference between various search engines and social networks. You will find some search engines operators and ways to access deep web.

Preview 12:58
Information Gathering using Search Engines and Social Networks - part 2
17:17

In this video I will present Maltego, o software used for gathering information about different items such as websites, domain, IP address, email, phone numbers, persons, etc.

Introduction to Maltego
04:58
+ Social Engineering Toolkit (SET)
2 lectures 08:01

Introduction to Social Engineering Toolkit

Introduction to SET
01:50

Learn to clone a website and host it locally in order to get credentials. In this example, you will learn to get Facebook Credentials.

Social Engineering Toolkit - Demo: Harvest Facebook Credentials
06:11
+ Social Engineering using Metasploit
3 lectures 23:55

In this video I will talk about Metasploit. Attached you can find a more detailed presentation about the framework and also the commands required to work with it.

Introduction to Metasploit
02:51

In this video I will show you how to create a backdoor for Windows and establish a remote session.

Backdoor in Windows using Metasploit
14:06

In this video I will show you how to create and exploit an Android device.

Backdoor in Android using Metasploit
06:58
+ Attacking the users trough websites - XSS and Beef-XSS
4 lectures 42:07

In this video I will explain the basics of Cross-Site Scripting: how it can be discovered, exploited and also mitigated. You will find attached a pdf with detailed theoretical information about XSS (Cross-Site Scripting).

Introduction to Cross-Site Scripting and Beef-XSS
08:27
XSS example - reflected
10:29
XSS example - stored
06:59

In this video I will show you how to get Facebook, Gmail, iCloud, LinkedIn and Windows passwords trough social engineering and cross-site scripting vulnerability.

Beef-XSS Demo
16:12
+ Final words
2 lectures 07:02

Some countermeasures for social engineering, general tips and tricks

Countermeasures for Social Engineering
06:47

A thank you note.

This is (not) the end!
00:15
+ (Bonus) Web attacks
4 lectures 49:14
Usernames and Passwords Brute-Forcing using Burp
14:54
Spider and Analyze a Website using Burp
05:27
Brute-frocing Web Resources using Dirb and Dirbuster
10:38
Bonus - OWASP Top 10 Vulnerabilities
18:15
+ (Bonus) Network Attacks
5 lectures 35:50
Demo - Exploiting FTP Server Vulnerability using Metasploit
09:38
Demo - Hack SSH passwords using Hydra
05:05
Hack Linux Passwords using John the Ripper
03:29
Penetration Testing on Wireless Networks
06:56
Case Study – Windows Hosted Network Bug or Feature
10:42
+ (Bonus) Android reverse Engineering
5 lectures 42:08
APK file Structure. AndroidManifest XML file
07:01
Reversing to get Source code of the Application - decompiling with dex2jar
10:53
Reversing and Re-compiling With APKTool
10:55
Static Analysis of Android Application using QARK
13:05
Further information
00:14