The Complete Social Engineering, Phishing, OSINT & Malware
Learn how hackers hack Windows, Linux & Android by using Social Engineering and protect yourself from phishing attacks
4.45 (7089 reviews)

23 837
students
3 hours
content
May 2025
last update
$74.99
regular price
What you will learn
Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system.
Becoming an ethical hacker involves learning at least one programming language and having a working knowledge of other common languages like Python, SQL, C++
Many hackers use the Linux operating system (OS) because Linux is a free and open-source OS, meaning that anyone can modify it. It’s easy to access.
Ethical hacking is legal because the hacker has full, expressed permission to test the vulnerabilities of a system
The Certified Ethical Hacker (CEH) certification exam supports and tests the knowledge of auditors, security officers, site administrators, security.
Learn how to create undetectable malware using MSFvenom, Veil, TheFatRat, Empire Project, etc
Passing the Certified Information Security Manager (CISM) exam indicates that the credentialed individual is an expert in the governance of information security
The different types of hackers include white hat hackers who are ethical hackers and are authorized to hack systems, black hat hackers who are cybercriminals.
Learn embedding malware in pdf and doc files
Learn the working mechanism of Social Engineering Toolkit
Learn social engineering techniques and terminologies
Learn about the Metasploit Framework
Learn how to achieve a realistic "vishing" attack: hacking people by phone
Learn how to collect information about people by using OSINT (Open Source Intelligence)
Learn how to use Empire
Learn how to use FOCA, Web Archieve, The Harvester & Recon-NG
ethical hacking
cyber security
android hacking
hacking
Ethical Intelligence
Ethical Hacker
Course Gallery




Charts
Students
Price
Rating & Reviews
Enrollment Distribution
Comidoc Review
Our Verdict
This course offers valuable insights into various aspects of social engineering, but it's important to recognize some minor shortcomings. While there are outdated tools and a mismatch between the title and content, the well-explained concepts and introduction to hacking techniques generally make this a worthwhile learning experience for IT professionals and cybersecurity enthusiasts.
What We Liked
- Covers various topics, providing a solid foundation in social engineering, phishing, OSINT, and malware
- In-depth explanations of hacking tools, such as Metasploit Framework, Social Engineering Toolkit, Kali Linux, and FOCA
- Well-prepared course with clear explanations on various concepts, making them easier to grasp
- Gives insight into real-world applications of social engineering, as well as techniques for detecting attacks
Potential Drawbacks
- Some tools mentioned are outdated or no longer in active development, such as TheFatRat and Empire project
- Inconsistencies between the course title and content, with a heavy focus on malware rather than social engineering
- Installation instructions take up approximately one-third of the entire course duration, leaving little time for practical examples or more advanced topics
- Occasional confusion as the instructor uses an Apple Mac operating system while the learners mostly use Windows
1531492
udemy ID
29/01/2018
course created date
03/08/2019
course indexed date
Bot
course submited by