IT & Software Learn Social Engineering & Open-source Intelligence (OSINT) | Udemy (1 Viewer)

Currently reading:
 IT & Software Learn Social Engineering & Open-source Intelligence (OSINT) | Udemy (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
4
Joined
Nov 21, 2025
Threads
1,137
Likes
104
Awards
9
Credits
23,215©
Cash
0$
gfBLY2O.jpg


What you’ll learn

Understand what Social Engineering is and how users can be affected
Perform social engineering attacks using tools and techniques

“Amateurs hack systems,professionals hack people.” (Bruce Schneier)

In this course, meant for beginners with no previous knowledge about penetration testing or hacking, that will start with the basics of social engineering, and by end of it you’ll be at an advanced level being able to hack into all major operating systems (windows, Android and so on), generate different types of trojans and deliver them using smart social engineering techniques.

To completely understand computer security, it’s vital to step outside the fence and to think outside the box. Computer security is not just about firewalls, Intrusion Prevention Systems or antiviruses. It’s also about tricking people into doing whatever a hacker wishes, for their benefit. A secure system, network or infrastructure is also about informed people. That’s it what about this course is all about. Knowing how easy is for a hacker to make a regular user to do something harmful for himself, even being aware that is making a bit mistake.

This course covers both theoretical and practical aspects and contains hands-on labs.

Learn how to get Facebook, Gmail iCloud, Linkedin password trough social engineering, create backdoors and get remote control.

This courses have demos and labs using Kali Linux.

Disclaimer: this course is intended for ethical hackers and those who want to protect against this kind of attacks. Those are only theoretical examples in a lab environment. Hacking is illegal without legal permission!

Who this course is for:

IT Security Engineers
IT passionates
Chef Security Officers
Link:
 
  • Like
Reactions: cave_im

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom