Learn Ethical Hacking Using The Cloud

User Avatar
(1 review)
9 Hours
$195.00 $99.99

Learn Ethical Hacking Using The Cloud

Learn how to use the cloud for hacking. With NO prior knowledge required, this course takes you from a beginner  to an expert at launching advanced attacks from the cloud. Giving you the ability to hack online accounts, web browsers, bypass two or multi factor authentication, and gain full remote control over all operating systems (Windows, Linux and Apple Mac OS) from within the cloud. That’s not all, you’ll also be able to use the cloud knowledge you acquire in this course to host your own websites and your own cloud applications.


Understand cloud concepts and use them for hacking
Create trojans for Windows, Linux and Apple Mac OS.
80+ videos
60+ hands-on real-life examples

Why is this course so in demand?

Verifiable zSecurity certificate of completion
Lifetime access to course materials and videos
Set the pace of your own study
Get answers from our Support Team within 15 hours
Unlimited updates to course materials and videos
Learn the way that best suits you

Plus! Free 1-month VIP membership with:

Live mentoring and Q&A session with course instructor and CTO, Zaid
Instant support from community members through our private discord channel
Daily updates with the latest tutorials and news from the hacking world
Daily resources like CTFs, bug bounty programs, onion services and more
Access our VIP community and connect with like-minded people
Discounts and offers on other zSecurity products and services

Here's how it works

This course is highly practical but it won’t neglect the theory. We’ll start with basics of ethical hacking and cloud computing. Then we’ll dive and start using the cloud for hacking straight away. You’ll learn everything by example, by hacking online accounts, computers, and browsers, no boring dry lectures. By the end of the course you will have a strong foundation in cloud computing and ethical hacking.

To achieve this the course is divided into a number of sections, each aims to teach you a specific hacking technique! You’ll first learn the cloud concepts related to this technique, then you’ll learn how to use the cloud to hack computers, phones, browsers, online accounts and much more. As we do this I will also introduce you to different hacking concepts, tools and techniques. Everything will be taught through examples and hands-on practicals, there will be no useless or boring lectures!

All the techniques in this course are practical and work against real systems, you’ll understand the whole mechanism of each technique first, then you’ll learn how to use it to hack from the cloud. Therefore by the end of the course you’ll be able to modify these techniques to launch more powerful attacks, and adopt them to suit different situations and different scenarios .

As mentioned this course will will teach you both ethical hacking and cloud computing at the same time, here are some of the topics that will be covered in the course:

Hacking topics:

  • Phishing basics + advanced.
  • Clone / replicate any website on the internet.
  • Bypass two or multi factor authentication (2FA / MFA).
  • Hacking online accounts such as Whatsapp accounts, email accounts, etc.
  • Hacking Windows, Apple Mac OS and Linux from the cloud.
  • Creating backdoors for Windows, Apple Mac OS and Linux.
  • Creating trojans for Windows, Apple Mac OS and Linux.
  • Hacking web browsers on all operating systems  and devices.
  • Stealing credentials using fake prompts .
  • Stealing sensitive info from hacked computers.
  • Accessing system resources such as the keyboard and camera from the cloud.
  • Advanced malware delivery using specialised cloud services.
  • Cross-platform download page to serve the right malware based on the target’s OS.
  • URL manipulation to include convincing words such as Facebook.
  • Generating convincing download links with safe extensions such as .pdf.
  • Launching ransomware attacks from the cloud.
  • Tracking any device from the cloud using a link.
  • Read, write download, upload and execute files on compromised systems.
  • Botnet basics and concepts.

Cloud topics:

  • Install & use Kali Linux from the cloud.
  • Cloning websites on the internet.
  • Install a GUI on cloud servers and access their desktop.
  • Hosting your own websites and cloud applications.
  • Enabling HTTPs.
  • Understand DNS and the different record types.
  • Use Amazon’s cloud service AWS.
  • Configuring firewall rules.
  • Link a domain name to cloud servers.
  • SSH basics.
  • FTP and SFTP basics.
  • Apache2 basics.
  • Novnc.

Other topics:

  • PHP basics.
  • Javascript basics
  • AI Basics
  • Linux basics.
  • Linux commands.
  • How to use the Linux terminal.

Throughout the course you’ll learn how to use use the following tools to achieve the above:

  • Kali Linux
  • AWS.
  • SSH.
  • Certbot
  • Evilginx.
  • Pwndrop.
  • Filezilla.
  • Openvnc.
  • Empire.
  • Starkiller
  • Distopia
  • Netcat.
  • BeEF.

Checkout the curriculum and the course teaser for more info!

With this course you’ll get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you within less than 15 hours.


  • This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
  • This course is totally a product of Zaid Sabih & zSecurity, no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANISATION IS INVOLVED.

What do you need to complete this course?

Basic Information Technology knowledge
No prior knowledge required in hacking or programming.
Computer with a minimum of 4GB RAM/Memory
Operating System: Windows / Apple Mac OS / Linux
$195.00 $99.99


Your instructor

Zaid Sabih

Ethical Hacker, Pentester & Computer Scientist

Zaid Al-Quraishi is an ethical hacker, computer scientist, and founder of zSecurity. He studied CS at UCD, graduating May 2016. Zaid has a strong background and experience in ethical hacking, starting with tutorials in 2009 in an ethical hacking community, iSecur1ty. He also worked as a penetration tester (pentester) for this company. In 2013 he started teaching his first course online in Arabic which received extremely positive feedback. This motivated him to create an English version of the course. The English course became the most popular and top paid course on Udemy for almost a year, which further motivated Zaid to design and teach more courses on ethical hacking. He now offers a number of courses on ethical hacking and more than 800,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity. Zaid says: "I just love hacking and breaking the rules but don't get me wrong, I am an ethical hacker!"


1 rating
  • Zaid

    Zaid is the best teacher in the world , I love very much !