Cyber Security - OSINT and Social Engineering Course
3.0 (17 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
837 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Cyber Security - OSINT and Social Engineering Course to your Wishlist.

Add to Wishlist

Cyber Security - OSINT and Social Engineering Course

Learn the underlying basics of the Open Source Intelligence and Social Engineering
3.0 (17 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
837 students enrolled
Last updated 5/2017
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • The Students will understand the basic concepts of OSINT and Social Engineering.
  • They will be able to use tools specified in the course for OSINT and Social Engineering
  • Will be able to perform extensive information gathering and also be able to perform Social Engineering
View Curriculum
Requirements
  • A Computer or a Smart Phone connected to the internet.
  • Interest to learn the fundamentals of OSINT and Social Engineering
  • Basic Understanding of the Computers and the Internet.
Description

Learn and understand the fundamental concepts of the Open Source Intelligence and Social Engineering and how they could be applied in the real world scenario. 

Social Engineering is a method that is hardly understood well by people, as it is the best way to get access into any systems when there is no possible way in terms of attacking the machines. And this course mainly aims at providing the knowledge on easily available tools to initially gather all the intelligence needed (via the Open Source Intelligence techniques), and then perform the Social Engineering Attacks based on all the information that is obtained. The tools used in this course are the standard tools used in the Information Security Industry and is explained in the most easy and understandable way.


Who is the target audience?
  • Cyber Security Professionals
  • Anyone who has interest in getting into the world of Cyber Security
  • Lawyers
Students Who Viewed This Course Also Viewed
Curriculum For This Course
17 Lectures
02:34:26
+
Start Here
17 Lectures 02:34:26


Technology Information
07:04

Browsers and Addons
25:26

Google Hacking
12:16

Searching Web beyond traditional methods
19:06

Reverse Image Searching
02:12

SHODAN Search
04:11

Other Useful Search Engines
03:05

Anonymity and Privacy through TOR
03:07

Social Engineering
12:52

Social Media Intelligence
12:21

Credential Harvesting
02:23

Maltego - 1
05:03

Maltego - 2
03:24

Maltego - 3
06:57

The Harvester
03:39
About the Instructor
FourthWall Technologies
3.7 Average rating
78 Reviews
3,595 Students
2 Courses
A new age Cyber Security Firm

We are a new age Cyber Security Firm. We as an organization aims towards providing Information Security Services and Process Improving Consulting services. Members of FWT have attained excellence in providing end-to-end consulting services across sectors including but not limited to Banks, Airports, Finance, IT, Retails etc. With the core team comprising of domain experts with over a decade of experience, we  help organizations to reduce risks and enhance their competitive advantage over others. We provide all cyber security solutions by ways of Penetration Testing and Quality Analysis of Web Based Applications and Web Infrastructures coupled with actionable reporting and patching the reported vulnerabilities. We provide constant scanning, surveillance and guarding services for web based resources. we also provide an array of sophisticated and customized web security training courses.