Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development SwiftUI Kotlin
Digital Marketing Google Ads (Adwords) Social Media Marketing Marketing Strategy Google Ads (AdWords) Certification Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Data Science
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Cyber Security Social Engineering

Learn Social Engineering From Scratch

Learn how to hack accounts & personal devices (Windows, Mac OS X, Linux & Android) & how to secure yourself from hackers
Bestseller
Rating: 4.6 out of 54.6 (3,836 ratings)
30,712 students
Created by Zaid Sabih, z Security
Last updated 12/2020
English
English, French [Auto], 
30-Day Money-Back Guarantee

What you'll learn

  • Hack updated & patched systems (Windows, Linux, OS X and Android).
  • Generate undetectable backdoors for Windows, Mac OS X, Linux & Android.
  • Generate malware to steal all passwords from Windows & Linux.
  • Embed malware in Microsoft Office documents.
  • Backdoor Android applications.
  • Make evil files (backdoors / keyloggers) look and function like normal files (image, pdf or any other file type).
  • Manually modify malware to bypass anti-virus programs.
  • Advanced malware delivery techniques (through fake pages, fake emails, indirect notifications....etc)
  • Advanced post exploitation.
  • Discover websites, companies, people, emails and social networking accounts associated with a person or a company.
  • Install hacking lab & needed software (on Windows, OS X and Linux)
  • Install Kali Linux - a penetration testing operating system
  • Install windows & vulnerable operating systems as virtual machines for testing
  • Learn linux basics
  • Learn linux commands and how to interact with the terminal
  • Build attack strategies based on the gathered info
  • Generate a remote keylogger that logs every key strike entered on a target computer and sends reports by email.
  • Backdoor Debian packages for Linux
  • Generate OS X backdoors that look and function like normal files (image, pdf ..etc).
  • Hack OS X and Linux computers by using a simple one line command.
  • Send emails from ANY email account.
  • Create fake websites that look exactly like any other website.
  • Create a fake login page and use it to stead passwords.
  • Use smart social engineering techniques to make the target person willingly use our fake website.
  • Deliver malware as fake updates, fake installers ..etc.
  • Read, write download, upload and execute files on compromised systems.
  • Capture key strikes on compromised systems.
  • Use a compromised computer as a pivot to hack other computers on the same network.
  • Maintain your access to the hacked systems even after restart.
  • Escalate your privileges to admin.
  • Analyse files & detect undetectable malware.
  • Use a sandbox to analyse undetectable malware.
  • Access messages, social accounts, camera, GPS .....etc of hacked phone.
Curated for the Udemy for Business collection

Requirements

  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux

Description

Note: The contents of this course are not covered in any of my other courses except for some basics. Although social engineering is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic covering more techniques, more operating systems, advanced exploitation, advanced post exploitation, bypassing security and more!


Welcome to this comprehensive course on Social Engineering! In this course, you will start as a beginner with no previous knowledge in hacking, and by the end of it you'll be at a high level in social engineering being able hack into all major operating systems (windows, OS X, Linux and Android) like black-hat hackers and secure yourself from hackers.

This course is focused on the practical side of social engineering without neglecting the theory, first you'll learn how to install the needed software (on Windows, Linux and Mac OS X), then the course is divided into a number of sections to represent the steps you'd take to successfully hack a target using social engineering.

1. Information Gathering - First before doing anything you need to know your target, in this section you'll learn how to gather information about your target whether it is a company, website or just a person. You will learn how to discover anything that is associated with your target such as websites, links, companies, users, emails, phone numbers, friends, social networks accounts ...etc, you will also learn how to graph all of this information and use it to build a smart attack strategy.

2. Generating Malware  - Now that you gathered enough information about your target and came up with an attack strategy, the next step is create custom malware that is attractive to the target. In this section you will learn how to generate evil files (files that execute tasks you want on the target computer), this includes backdoors, keyloggers, credential harvester and more, these files will work on all operating systems (Windows, OS X, Linux and Android), you'll also learn how to enhance these files to make them bypass all anti-virus programs, and make them look and function just like any other file such as an image or a pdf,  or even embed them in legitimate Microsoft Office documents. 

3. Delivery Methods - Now that you have your custom-made trojan ready, in this section you will learn a number of social engineering techniques to deliver it to the target, you will learn how to create fake websites that look identical to websites the target trusts, send emails that appear like they're coming from people the target trusts and use fake login pages and fake updates to hack into the target, you'll also learn advanced social engineering techniques to lure the target into visiting an evil URL and hack into their system without even interacting with them.

4. Post Exploitation - In this section you will learn how to interact with the systems you compromised whether they use Windows, Linux, OS X or even Android. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, escalate your privileges, spy on the target, use the target computer as a pivot to hack other computers and more! If your target uses Android then you'll also learn how to read their messages, find their location, access their other accounts (such as Whatsapp, Facebook ...etc) and more!

Finally at the end of the course you will learn how to protect yourself and your systems from these attacks.


All the attacks in this course are practical attacks that work against real computers, in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.


Notes:

  • This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

  • This course is totally a product of Zaid Sabih & zSecurity, no other organization is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANIZATION IS INVOLVED.



Who this course is for:

  • People who want to learn ethical hacking / social engineering
  • People who want to learn how hackers hack into secure systems that do not have any vulnerabilities
  • Anybody who wants to learn how to secure their systems from social engineering attacks

Featured review

Kedar Parikh
Kedar Parikh
18 courses
6 reviews
Rating: 5.0 out of 511 months ago
I have alaways admired zaid for his amazing courses and this course is amazing. You should definitely take this course and It wil take your social engineering skills to the next level. All the courses by zaid are amazing this is my seccond course which I did of zaid and I Bought the Website Hacking course as well because its amazing. I Enjoyed and learnt alot during this course and Thank You Zaid for helping me and teaching me this course :) You are the best teacher on Udemy:)

Course content

20 sections • 107 lectures • 12h 19m total length

  • Preview05:34
  • Introduction to Social Engineering
    03:14
  • Course Overview
    04:16

  • Lab Overview & Needed Software
    07:48
  • Installing Kali 2020 As a Virtual Machine Using a Ready Image
    11:13
  • Installing Windows As a Virtual Machine
    03:22
  • Installing Ubuntu As a Virtual Machine
    07:05

  • Basic Overview Of Kali Linux
    05:10
  • The Linux Terminal & Basic Linux Commands
    11:21
  • Creating & Using Snapshots
    05:36

  • Introduction
    01:52

  • Maltego Overview
    06:02
  • Discovering Domain Info & Emails Associated With Target
    07:24
  • Discovering Information About Hosting Company, Support Team Emails & Admin Email
    06:55
  • Discovering Files, Links, Websites & Other Companies Related To Target
    05:12
  • Using The Gathered Info To Build An Attack Strategy
    04:16

  • Discovering Websites, Links & Social Networking Accounts
    09:28
  • Discovering Twitter Friends & Associated Accounts
    04:57
  • Discovering Emails Of The Target's Friends
    04:39
  • Analysing The Gathered Info & Building An Attack Strategy
    08:41

  • Preview02:14

  • Installing Veil Framework
    04:51
  • Veil Overview & Payload Basics
    07:20
  • Generating Undetectable Backdoors For Windows
    09:44
  • Listening For Incoming Connections
    07:25
  • Hacking A Windows 10 Machine Using The Generated Backdoor
    07:12
  • Introduction to The Fat Rat
    06:18
  • Generating An Undetectable Backdoor For Windows - Method 2
    11:29
  • Introduction to Empire
    09:18
  • Creating a Windows Powershell Stager & Hacking Windows 10
    07:29
  • Modifying Backdoor Source To Bypass All Anti-virus Programs
    08:13

  • Introduction to Keyloggers
    06:34
  • Creating A Remote Keylogger
    09:02
  • Using A Remote Keylogger To Capture Key Strikes Including Passwords
    07:31
  • Password Recovery Basics
    07:29
  • Recovering Saved Passwords From Local Machine
    03:17
  • Recovering Saved Passwords From A Remote Machine
    11:51

  • Bypassing All Anti-Virus Programs By Modifying Hex Vales
    10:35
  • Download & Execute Payload
    06:18
  • Preview06:49

Instructors

Zaid Sabih
Ethical Hacker, Computer Scientist & CEO of zSecurity
Zaid Sabih
  • 4.6 Instructor Rating
  • 130,638 Reviews
  • 548,244 Students
  • 9 Courses

My name is Zaid Al-Quraishi, I am an ethical hacker, a computer scientist, and the founder and CEO of zSecurity. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.

I have tremendous experience in ethical hacking, I started making video tutorials back in 2009 in an ethical hacking community (iSecuri1ty), I also worked as a pentester for the same company. In 2013 I started teaching my first course live and online, this course received amazing feedback which motivated me to publish it on Udemy.

This course became the most popular and the top paid course in Udemy for almost a year, this motivated me to make more courses, now I have a number of ethical hacking courses, each focusing on a specific field, dominating the ethical hacking topic on Udemy.

Now I have more than 650,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity.

z Security
Leading provider of ethical hacking and cyber security training,
z Security
  • 4.6 Instructor Rating
  • 130,572 Reviews
  • 543,138 Students
  • 9 Courses

zSecurity is a leading provider of ethical hacking and cyber security training, we teach hacking and security to help people become ethical hackers so they can test and secure systems from black-hat hackers. 

Becoming an ethical hacker is simple but not easy, there are many resources online but lots of them are wrong and outdated, not only that but it is hard to stay up to date even if you already have a background in cyber security. 


Our goal is to educate people and increase awareness by exposing methods used by real black-hat hackers and show how to secure systems from these hackers.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.