Learn Social Engineering From Scratch (Udemy.com)

Learn how to hack accounts & personal devices (Windows, Mac OS X, Linux & Android) & how to secure yourself from hackers

Created by: Zaid Sabih

Produced in 2022

icon
What you will learn

  • Hack updated & patched systems (Windows, Linux, OS X and Android).
  • Generate undetectable backdoors for Windows, Mac OS X, Linux & Android.
  • Generate malware to steal all passwords from Windows & Linux.
  • Embed malware in Microsoft Office documents.
  • Backdoor Android applications.
  • Make evil files (backdoors / keyloggers) look and function like normal files (image, pdf or any other file type).
  • Manually modify malware to bypass anti-virus programs.
  • Advanced malware delivery techniques (through fake pages, fake emails, indirect notifications....etc)
  • Advanced post exploitation.
  • Discover websites, companies, people, emails and social networking accounts associated with a person or a company.
  • Install hacking lab & needed software (on Windows, OS X and Linux)
  • Install Kali Linux - a penetration testing operating system
  • Install windows & vulnerable operating systems as virtual

icon
Quality Score

Content Quality
/
Video Quality
/
Qualified Instructor
/
Course Pace
/
Course Depth & Coverage
/

Overall Score : 0 / 100

icon
Live Chat with CourseDuck's Co-Founder for Help

Need help deciding on a other course? Or looking for more detail on Zaid Sabih's Learn Social Engineering From Scratch? Feel free to chat below.
Join CourseDuck's Online Learning Discord Community

icon
Course Description

Note: The contents of this course are not covered in any of my other courses except for some basics. Although social engineering is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic covering more techniques, more operating systems, advanced exploitation, advanced post exploitation, bypassing security and more!
Welcome to this comprehensive course on Social Engineering!
In this course, you will start as abeginnerwith no previous knowledge inhacking, and by the end of it you'll be at a high level in social engineering being able hack into all major operating systems(windows, OS X, Linux and Android) like black-hat hackers and secure yourself from hackers.
This course is focused on thepractical side of social engineering without neglecting the theory,first you'll learn how to install the needed software (on Windows, Linux and Mac OS X), then the course is divided into a number of sections to represent the steps you'd take to successfully hack a target using social engineering.
1.
Information Gathering-First before doing anything you need to know your target, in this section you'll learn how to gather information about your target whether it is a company, website or just a person.
You will learn how to discover anything that is associatedwith your target such aswebsites, links, companies, users, emails, phone numbers, friends, social networks accounts ...
etc, you will also learn how to graph all of this information and use it to build a smart attack strategy.
2.
Generating Malware - Now that you gathered enough information about your target and came up with an attack strategy, the next step is create custom malware that is attractive to the target. In this section you will learn how to generate evil files (files that execute tasksyou want on the target computer), this includes backdoors, keyloggers, credential harvesterand more, these files will work on all operating systems (Windows, OS X, Linux and Android), you'll alsolearn how toenhancethese files to make them bypass all anti-virus programs, and make them look and function just like any other file such as an image or a pdf, or even embed them in legitimate Microsoft Office documents.
3.
Delivery Methods - Now that you have your custom-made trojan ready, in this section you will learn a number of social engineering techniques to deliver it to the target, you will learn how to create fake websites that look identical to websites the target trusts, send emails that appear like they're coming from people the target trusts anduse fake login pages and fake updatesto hack into the target, you'll also learn advanced social engineering techniques to lure the target into visiting an evil URL andhack into their systemwithout even interacting with them.
4.
Post Exploitation -In this section you will learn how to interact with the systems you compromised whether they use Windows, Linux, OS X or even Android. Youlllearnhow to access the file system (read/write/upload/execute),maintain your access, escalateyour privileges,spyon the target,use the target computer as a pivot to hack other computers and more! If your target uses Android then you'll also learn how to read their messages, find their location, access their other accounts (such as Whatsapp, Facebook ...
etc) and more!
Finally at the end of the course you will learn how to protect yourself and your systems from these attacks.
All the attacks in this course arepractical attacksthatwork against real computers, ineach technique you will understand the theory behind it andhow it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine themto come up with more powerful attacks and adopt them to different scenarios and different operating systems.
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.
Notes: This course is created for educational purposes only andall the attacks are launched in my own lab or against devices that I have permission to test.
This course is totally a product of Zaid Sabih & zSecurity, no otherorganizationis associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANIZATION IS INVOLVED.
Who this course is for:
People who want to learn ethical hacking / social engineeringPeople who want to learn how hackers hack into secure systems that do not have any vulnerabilitiesAnybody who wants to learn how to secure their systems from social engineering attacks

*Some courses are excluded from this sale. Coupon not working? If the link above doesn't drop prices, clear the cookies in your browser and then click this link here.
Also, you may need to apply the coupon code directly on the cart page to get the discount.

Coupon Code

icon
Instructor Details

Zaid Sabih

My name is Zaid Al-Quraishi, I am an ethical hacker, a computer scientist, and the founder and CEO of zSecurity. I just love hacking and breaking the rules, but dont get me wrong as I said I am an ethical hacker.
I have tremendous experience in ethical hacking, I started making video tutorials back in 2009 in an ethical hacking community (iSecuri1ty), I also worked as a pentester for the same company. In 2013 I started teaching my first course live and online, this course received amazing feedback which motivated me to publish it on Udemy.
This course became the most popular and the top paid course in Udemy for almost a year, this motivated me to make more courses, now I have a number of ethical hacking courses, each focusing on a specific field, dominating the ethical hacking topic on Udemy.
Now I have more than 350,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity.

icon
Reviews

0.0

0 total reviews

5 star 4 star 3 star 2 star 1 star
% Complete
% Complete
% Complete
% Complete
% Complete

By Stefano Conti on 11/13/2020

Very nice training, good for beginners - mid level expertise. I've particularly appreciated the practical approach with a lot of examples and demo

By scar Muoz Solano on 10/27/2020

Great course. Zaid is a good instructor. I really like the way gives the classes. I hope he makes new courses about hacking and with subtitles in spanish because im mexican and my english is not so good.

By Kochav on 10/17/2020

This instructor is very good, he speak very clearly and explain every thing in a way that is easy to understand. The course seem to be very interesting for me.

By Taru_Dave on 10/17/2020

Enjoyed the material and explanation. Like it very much.

By James M on 10/17/2020

It exactly is as the rate states: Poor! Pretty Disappointing! It's a Whack-A-Mole! VIEUX JEU ! It's a Script Kiddie.
The entire course hinges on one idea - that is to infect the target machine with backdoors. IT FAILED to DELIVER on THAT SO MISERABLY !
A 2-stars for this course is more than generous! But until this very specific issue get solved - I won't give it more that 1 and a 1/2.
Got this course for over 2 yrs - I picked up where I left off - same problems, same issues - nothing changed a bit. As it's only been yesterday.
What's so disappointing is that, although Zaid is a great instructor - no question about that - and his delivery is so engaging; however, the methods and tools taught in this course did not live up to the expectations.
Here's why.
Maltego - it gives you ZERO useful info about your target.
BeEF is just an old fellow that just need to put on retirement.
Backdoors generated by Empire, Veil, FatRat, Phantom-Evasion, msfvenom all are still getting detected by AV programs.
Those tools are now obsolete - they are simply hackneyed.
Every other suggestion and recommendation given in the Q&A section of the course - pertaining to bypassing the AV programs - renders ineffective.
For instance those methods FAILED and proved USELESS to trick and bypass the Windows Defender AV program.
Almost all the online AV tools mentioned in the course do not work. One does not exist any more; another doesn't support all file extensions; others always have their servers down.
The sections pertaining to those aforementioned should be replaced or be updated.
I believe many tools taught in this course need be removed and replaced by up-to-date ones.
ZLogger was a mess - solved now - on both Windows and Linux. Kudos to the team!
With the help of the TAs, I managed to get LaZagne work on both Windows and Ubuntu systems - using Official Kali Linux. Big fat Kudos to the team!
The Hex tool suggested to bypass AV programs does everything EXCEPT bypassing AV programs.
The spoofing method of exe file extensions still got detected by the AV.
The ONLY lecture dedicated to hacking mobile phones - Android in that lecture - FAILED miserably.
Mail Spoofing using SMTP server- will you guessed - does NOT work.
Anonymous email - not free anymore.
A minor update to a lecture or a resource does not mean that the course is constantly being updated or kept up to date! Even if it says that on the course banner.
The 33-min YouTube video provided by Zaid and that claimed it would help bypass AV programs specially Windows Defender - will it just proved to be WORTHLESS.
It merely showed that it successfully bypassed the AV tools that were hosted in an Online Virus Scanner that itself clearly pointed out that the results were not to be taken for their face value. And that exactly what the case was.
Even though the online scanner showed that the payload bypassed Win Defender, however, when it was tested on a real machine, Windows Defender WAS in fact ABLE to detect and delete that payload.
Regarding the TA (Teaching Assistants) - Used to be bad pertaining to their competitiveness, responses , response time. But things are getting better now.
Having said so, and although those TAs might appear as hard workers, but they lack creativity - given they live only in their bubble called 'Custom Kali Image' which has loads of flaws, and breaks all the time, which renders it unstable and unreliable.

Not only did Zaid 's courses and close to 500K users make him a rich and wealthy person, but also made the cyber world a safer place! And that's why this course failed.
What a Paradox that is!
One thing is consistent throughout Zaid's courses though- that is telling students that their problems would be solved in the Bonus section - which is no more than a marketing tool to FOOL you into buying his other courses.
As mentioned in the beginning of this rate, I believe it's fair to give this course a rating of NO more than 2 stars!
Thanks

By santiago rodriguez on 9/11/2020

the instructor didnt really cover the "social engineering" part. i was expecting a lot more social engineering and delivery methods than basic stuff.

This course is the best for learning social engineering, it is very easy to follow, and all lectures are clear because I highly recommend it for everyone.

By harsh samoliya on 8/26/2020

INSTRUCTOR do not reply on time
we have to wait couple of hours to get responese
most of the response are
that your are not using custom kali image

By Sumit Mahajan on 3 days ago

Kali linux is not starting on my PC, and when it does its always lagging. Its been many days that i have been asking for help, i have tried many things that those assistant told to do, but nothing is working

By Gordon Kirsch on 7/18/2020

This is NOT a source on social engineering. This is a course on basic malware using scripts. It had almost no social engineering content.

By Trng Giang on 11/21/2020

Frankly this course is extremely bad (as of 9/2020) for the following reasons:
- Most of the lessons in this course are recorded in 2016/2017 and not updated until the present time (But in external advertising, it says updated till 08/2020)
-> Now it's 2020. Tools, antivirus, systems ... have also updated, leading to changes in everything
-> Every time I come to a new lessons, I always get an error and have to wait for the support person, but the support person doesn't support until the students fix all the errors completely
-> This course is too bad if you bought it in 2020, not worth the money
-> What a blatant lie. Because I haven't seen much videos recorded in 2020 (except setup environments =)) )

By Shadab M S on 6/4/2020

The course is really good but on some topics you have to make the course content more deep as everyone can understand it very well.