Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Learn Social Engineering From Scratch

Course Cover
compare button icon

Course Features

icon

Duration

12.1 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

12.1 hours

Course Description

Social Engineering is a great way to hack Windows, Mac OS X and Linux.

About This Video

  • Learn how to gather information about your target, whether it's a company, website or individual.
  • You will learn how you can find anything that is related to your target and how to graph this information to create a smart attack strategy.
  • Learn more about hacking and social-engineering and how it can be both dangerous and useful.

This comprehensive course in social engineering is now available! This course is for beginners with no prior knowledge of hacking or penetration testing. We will begin with the basics of social Engineering and then move on to advanced techniques that will allow you to hack into all major operating system (Windows, OS X and Linux), create trojans and deliver them using smart social-engineering techniques. This course focuses on the practical aspects of penetration testing, but not the theory. Before you can start practicing penetration testing on your own machine, you'll need to know how to set up a lab. You will also learn how to protect your system and yourself from these attacks at the end. This course teaches you how to attack real computers with practical attacks. Each technique will be explained in detail. Then you'll be able use it in a real-world scenario.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Learn about hacking and social engineering and how it can be both useful and dangerous

Learn how to gather information about your target whether it is a company, website, or just a person

You will learn how to discover anything that is associated with your target as well as how to graph all of this information and use it to build a smart attack strategy

Course Cover