Learn Social Engineering Attacks Through Android
This course is intended to help you better prepare your organization for the defence of social engineering attacks, as well as how to ethically use these techniques for intelligence gathering.
This highly-interactive course balances practical lectures and discussion with multiple hands-on exercises, demonstrations.
In this course, I am going to take you through the various phases so as to understand what is Social Engineering, Social Engineering Life cycle, the various Techniques used in Social Engineering attacks with detailed examples and then finally conclude with the counter-measures to protect against each of the Social Engineering attack techniques.
If you are a beginner or don't having the knowledge about the hacking if you gonna take this course am sure that by the end this course you will have the advanced level knowledge about hacking or penetration testing.
This course is intended to help you better prepare your organization for the defense of social engineering attacks, as well as how to ethically use these techniques for intelligence gathering.
Did You Know?
Social engineering attacks, which are typically launched via email, include phishing, spear-phishing and Business Email Compromise (BEC). According to the FBI, BEC scams have resulted in losses of £2.4 billion ($3.1 billion) in the previous years.
NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
Who this course is for:
Requirements:
What you'll learn:
Things You will Learn
Termux Introduction and Installation
Termux Storage Setup
Installing Social-Engineer Toolkit
Resources-Installing Social-Engineer Toolkit
Installing Metasploit Framework on Termux
Resource - Installing Metasploit Framework on Termux
Things You will Learn
FREE PREVIEWInstalling Nmap on Android
Discovering Devices Connected To The Network
Listing Open Ports On a Remote Host
Performing a Phishing Attack to
Email Spoofing -Send E-Mail Using Fake or Other Person's E-Mail
Things You will Learn
FREE PREVIEWGenerating a Simple Payload With Se-Toolkit
Hack Windows Machine By Using The Generated Payload
Hacking Windows Machine With The Use Of Powershell Injector and Metasploit
How to Send Payload to Victim
Things You will Learn
FREE PREVIEWCreate USB Password Stealer And Get All Passwords From The Victims Computer
Recovering Saved Passwords From A Remote Machine
Creating a KEYLOGGER On Android
Things You will Learn
Ngrok Installation,Configuration and Port Forwarding
Phishing Attack Outside LAN Using Ngrok
Create Phishing Pages Of Most Popular Websites
Resources-Create Phishing Pages Of Most Popular Websites
Things You will Learn
FREE PREVIEWEmbedding Malware in PDF
Embedding Malware in Image
9.1 Things You will Learn
FREE PREVIEW9.2 Basics of Meterpreter
9.3 File System Commands
9.4 Spying - Capturing Keystrokes & Taking Screen Shots
How to Detect Phishing Page
How to Detect Spoof Emails
How To Detect Malware
How to Find Malware in Adobe PDF File
Resource - How to Find Malware in Adobe PDF File
Muhammad Ali
Information Security Engineer
I’m a Network Engineer and security analyzer, & Hold a Master degree in Computer Network Engineering (CNE) with distinction and am currently working as a Researcher in IT security.
My method of teaching is mostly by considering real life examples, I usually start the topic by explaining the theory behind every technique, then shows you how it actually works in a real life scenario.
My passion to the ethical hacking has mixed with the background in programming which makes me a wise Swiss knife professional in the computer science field.
"Learn Social Engineering Attacks Through Android"
$9.99
Lifetime enrollment
You may like these other courses by Muhammad Ali.