Hack People Instead of Systems. Social Engineering Basics
4.5 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
131 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Hack People Instead of Systems. Social Engineering Basics to your Wishlist.

Add to Wishlist

Hack People Instead of Systems. Social Engineering Basics

IT security is not just about firewalls or antiviruses, it is also about people.
4.5 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
131 students enrolled
Created by Gabriel Avramescu
Last updated 6/2017
English
Curiosity Sale
Current price: $10 Original price: $150 Discount: 93% off
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • 12 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand what Social Engineering is and how users can be affected
  • Perform social engineering attacks using tools and techniques
View Curriculum
Requirements
  • basic computer skills
  • basic web security and linux knowledge
Description

JUST LAUNCHED! PROMO PRICE!

"Amateurs hack systems,professionals hack people." (Bruce Schneier)

To completely understand computer security, it's vital to step outside the fence and to think outside the box. Computer security is not just about firewalls, Intrusion Prevention Systems or antiviruses. It's also about tricking people into doing whatever a hacker wishes, for their benefit. A secure system, network or infrastructure is also about informed people. That's it what about this course is all about. Knowing how easy is for a hacker to make a regular user to do something harmful for himself, even being aware that is making a bit mistake.

This course covers both theoretical and practical aspects and contains hands-on labs.

Learn how to get Facebook, Gmail iCloud, Linkedin password trough social engineering, create backdoors and get remote control.

Disclaimer: this course is intended for ethical hackers and those who want to protect against this kind of attacks. Those are only theoretical examples in a lab environment. Hacking is illegal without legal permission!

Who is the target audience?
  • IT Security Engineers
  • IT passionates
  • Chef Security Officers
Students Who Viewed This Course Also Viewed
Curriculum For This Course
18 Lectures
02:11:52
+
Introduction
3 Lectures 06:18

A few words about the author

Preview 00:30

In this video I will explain what the course is all about.

Preview 01:55

In this video I will show you different types of social engineering.

Types of Social Engineering
03:53

Social Engineering Quick Quiz
3 questions
+
Information Gathering
4 Lectures 44:29

In this video I will explain the difference between various search engines and social networks. You will find some search engines operators and ways to access deep web.

Information Gathering using Search Engines and Social Networks - part 1
12:58

Information Gathering using Search Engines and Social Networks - part 2
17:17

In this video I will present Maltego, o software used for gathering information about different items such as websites, domain, IP address, email, phone numbers, persons, etc.

Introduction to Maltego
04:58


Quiz for Maltego and Information Gathering
2 questions
+
Social Engineering Toolkit (SET)
2 Lectures 08:01

Introduction to Social Engineering Toolkit

Introduction to SET
01:50

Learn to clone a website and host it locally in order to get credentials. In this example, you will learn to get Facebook Credentials.

Social Engineering Toolkit - Demo: Harvest Facebook Credentials
06:11

Social Engineering Toolkit Quiz
2 questions
+
Social Engineering using Metasploit
3 Lectures 23:55

In this video I will talk about Metasploit. Attached you can find a more detailed presentation about the framework and also the commands required to work with it.

Introduction to Metasploit
02:51

In this video I will show you how to create a backdoor for Windows and establish a remote session.

Backdoor in Windows using Metasploit
14:06

In this video I will show you how to create and exploit an Android device.

Backdoor in Android using Metasploit
06:58

Metasploit Quiz
3 questions
+
Attacking the users trough websites - XSS and Beef-XSS
4 Lectures 42:07

In this video I will explain the basics of Cross-Site Scripting: how it can be discovered, exploited and also mitigated. You will find attached a pdf with detailed theoretical information about XSS (Cross-Site Scripting).

Introduction to Cross-Site Scripting and Beef-XSS
08:27

XSS example - reflected
10:29

XSS example - stored
06:59

In this video I will show you how to get Facebook, Gmail, iCloud, LinkedIn and Windows passwords trough social engineering and cross-site scripting vulnerability.

Beef-XSS Demo
16:12
+
Final words
2 Lectures 07:02

Some countermeasures for social engineering, general tips and tricks

Countermeasures for Social Engineering
06:47

A thank you note.

This is (not) the end!
00:15
About the Instructor
Gabriel Avramescu
4.1 Average rating
340 Reviews
5,141 Students
8 Courses
Senior Information Security Consultant, IT Trainer

Senior Information Security Consultant

I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. Act as an effective participant in multidisciplinary security project team. -Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking). Make recommendations on security weaknesses and report on activities and findings. - Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated) - Security lab fixed and virtual assets design for different LAN / WAN architectures - Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment - Perform analysis and testing to verify the strengths and weaknesses of - Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.) - Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures - Assist with the development of remediation services for identified findings - Customize, operate, audit, and maintain security related tools and applications

IT Trainer

- Trainer for Web Application Hacking and Network Infrastructure Hacking - Training students for CCNA and CCNA Security Certification - Training NDG Linux Basics - Legal Main Contact - Curriculum Leader

Certifications

- OSCP

- CREST CRT (Registered Penetration Tester)

- ISO 270001 Lead Auditor

- ECSA (EC-Council Certified Professional)

- CEH (Certified Ethical Hacker)

- CEI (Certified EC-Council Instructor)

- VMWare vSphere Install, Configure, Manage

- CCNA and CCNA Security

- CCNP Routing and CCNP Switching

- Advanced Linux&InfoSEC

- Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.