Learn Social Engineering Attacks Using Android Without Root

  • Overview
  • Curriculum
  • Instructor
  • Review

About This Course

Learn Ethical Hacking with Android ,Use Your Android Device As a Penetration Testing Tool

This highly-interactive course balances practical lectures and discussion with multiple hands-on exercises, demonstrations.

In this course, I am going to take you through the various phases so as to understand what is Social Engineering, Social Engineering Life cycle, the various Techniques used in Social Engineering attacks with detailed examples and then finally conclude with the counter-measures to protect against each of the Social Engineering attack techniques.

If you are a beginner or don't having the knowledge about the hacking if you gonna take this course am sure that by the end this course you will have the advanced level knowledge about hacking or penetration testing.

This course is intended to help you better prepare your organization for the defense of social engineering attacks, as well as how to ethically use these techniques for intelligence gathering.


Did You Know?

Social engineering attacks, which are typically launched via email, include phishing, spear-phishing and Business Email Compromise (BEC). According to the FBI, BEC scams have resulted in losses of £2.4 billion ($3.1 billion) in the previous years.

NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.   



  • What is social engineering?

  • You will see how to gather information of targets.

  • Building attacking Strategies Based on Information of victim

Course Curriculum

Instructor

Profile photo of Muhammad Ali
Muhammad Ali

I’m a Network Engineer and Security Analyzer, & Hold a Master degree in Computer Network Engineering (CNE) with distinction and I'm currently working as a Researcher in IT security. My method of teaching is mostly by considering real life examples, I usually start the topic by explaining the theory behind every technique, then shows you how it actually works in...

Review
4.9 course rating
4K ratings
ui-avatar of Faisal Ahmed
Faisal A.
1.0
3 years ago

Sorry for rating 5star.. Your tutorial not to say good explain full details instructions ..

  • Helpful
  • Not helpful
ui-avatar of Pradeep Kumar Yadav
Pradeep K. Y.
2.5
4 years ago

three star give you because you are not attach any resources file

  • Helpful
  • Not helpful
ui-avatar of James Duncan
James D.
4.0
5 years ago

Good information on how hacking can be done using a mobile device, and how to detect these attacks.

  • Helpful
  • Not helpful
ui-avatar of Anton Meyburgh
Anton M.
5.0
6 years ago

Very cool and great examples!!!

  • Helpful
  • Not helpful
ui-avatar of Irfan Neox
Irfan N.
4.0
6 years ago

not good enough tutorial, too basic but im enjoying it.

  • Helpful
  • Not helpful
ui-avatar of Levi
Levi
4.5
6 years ago

Way better! Very happy

  • Helpful
  • Not helpful
ui-avatar of Kazeem adeleke
Kazeem A.
4.5
6 years ago

having difficulty installing setookit because he jump the installation with something already on screen

  • Helpful
  • Not helpful
ui-avatar of Jericho P Adams
Jericho P. A.
5.0
6 years ago

This course is fantastic!! I love it!! I would recommend this to anyone curious about this course.

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses