What You Need to Know Before
You Start

Starts 3 June 2025 07:54

Ends 3 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Learn Social Engineering & Open-source Intelligence (OSINT)

IT security is not just about firewalls or antiviruses, it is also about people.
via Udemy

4052 Courses


4 hours 22 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Paid Course

Optional upgrade avallable

Overview

IT security is not just about firewalls or antiviruses, it is also about people. What you'll learn:

Understand what Social Engineering is and how users can be affectedPerform social engineering attacks using tools and techniques "Amateurs hack systems,professionals hack people." (Bruce Schneier)In this course, meant for beginnerswith no previous knowledge about penetration testing orhacking,that will start with thebasics of social engineering,and byend of it you'll be at an advanced levelbeing able tohack into all major operating systems(windows, Android and so on),generate different types of trojans and deliver them using smart social engineering techniques.To completely understand computer security, it's vital to step outside the fence and to think outside the box.

Computer security is not just about firewalls, Intrusion Prevention Systems or antiviruses. It's also about tricking people into doing whatever a hacker wishes, for their benefit.

A secure system, network or infrastructure is also about informed people. That's it what about this course is all about.

Knowing how easy is for a hacker to make a regular user to do something harmful for himself, even being aware that is making a bit mistake.This course covers both theoretical and practical aspects and contains hands-on labs.Learn how to get Facebook, Gmail iCloud, Linkedin password trough social engineering, create backdoors and get remote control.This courses have demos and labs usingKali Linux.Disclaimer:

this course is intended for ethical hackers and those who want to protect against this kind of attacks. Those are only theoretical examples in a lab environment.

Hacking is illegal without legalpermission!

Syllabus

  • Introduction to Social Engineering (SE) and Open-source Intelligence (OSINT)
  • Definition and importance of SE and OSINT
    Ethical considerations and legal implications
    Overview of course objectives and outcomes
  • Understanding Human Psychology in SE
  • The role of persuasion and influence
    Common psychological principles exploited in SE attacks
    Case studies of effective SE tactics
  • Techniques in Social Engineering
  • Phishing, spear-phishing, and vishing
    Baiting and pretexting
    Elicitation and impersonation techniques
  • OSINT Fundamentals
  • Definition and scope of OSINT
    The OSINT cycle: Planning, collection, analysis, and dissemination
    Tools and resources for OSINT research
  • Information Gathering and Reconnaissance
  • Identifying and leveraging open sources: Public records, social media, and web
    Techniques for data mining and analysis
    Maintaining anonymity and privacy during OSINT activities
  • Advanced Social Engineering Tactics
  • Target selection and research
    Building a rapport and trust with targets
    Crafting convincing narratives and scenarios
  • OSINT Tools and Techniques
  • Exploring OSINT tools: Maltego, Shodan, and others
    Social media investigation and monitoring
    Analyzing and visualizing data
  • Mitigating and Defending Against SE and OSINT
  • Best practices for personal and organizational protection
    Recognizing and responding to SE attacks
    Implementing effective security awareness training
  • Case Studies and Real-world Applications
  • Analyzing historical SE and OSINT incidents
    Discussing lessons learned and best practices
    Exploring future trends and developments in SE and OSINT
  • Course Wrap-up and Assessment
  • Review of key concepts
    Final project or assessment to demonstrate mastery
    Feedback and course evaluation

Taught by

Gabriel Avramescu


Subjects

Information Security (InfoSec)