$99.99
Learn Social Engineering Online
Become a Hacker

Social Engineering: Manipulating Human Behaviour to Exploit or Protect Systems
This comprehensive Social Engineering course is designed for complete beginners, guiding you step-by-step from scratch to an advanced level.
By the end, you’ll be able to hack major operating systems, including Windows, Mac OS, Linux, and Android, while also learning how to protect yourself from hackers. The course is highly practical, with no boring lectures, starting with software installation before diving into real-world hacking techniques.
You’ll first understand the theory behind each attack and then apply it in hands-on scenarios, allowing you to modify and combine techniques for more powerful, adaptable attacks across different operating systems.
$99.99
$99.99
Social Engineering: Manipulating Human Behaviour to Exploit or Protect Systems
This comprehensive Social Engineering course is designed for complete beginners, guiding you step-by-step from scratch to an advanced level.
By the end, you’ll be able to hack major operating systems, including Windows, Mac OS, Linux, and Android, while also learning how to protect yourself from hackers. The course is highly practical, with no boring lectures, starting with software installation before diving into real-world hacking techniques.
You’ll first understand the theory behind each attack and then apply it in hands-on scenarios, allowing you to modify and combine techniques for more powerful, adaptable attacks across different operating systems.
$99.99
Hack all Operating Systems
OSINT
Advanced Malware Delivery
Post Exploitation
- Course Length: 12 hours
- Skill Level: Beginner – Intermediate
- Course type: Pre-Recorded Lessons
What is included?
- 110+ Video Lessons (12.5 hours)
- 17+ Downloadable Resources
- Lifelong access to the course materials
- Full time support from our expert team
- Verifiable zSecurity certification of completion (Applicable to CPA)
- Free 1 Month zSecurity Trial VIP membership
↳ Live Mentoring and Q&A sessions
↳ Access to the zSecurity discord with like-minded hacking community members
↳ Daily Updates, latest tutorials and news from the hacking world
↳ Daily resources like CTFs, Bug Bounties, Onion services, etc
↳ Discounts and offers on other zSecurity products and services
5 REASONS TO STUDY SOCIAL ENGINEERING
- Understand a Hacker’s Mindset: Learn how attackers exploit human psychology and uncover advanced manipulation techniques to build stronger defences.
- Protect Yourself and Your Organisation: Recognise and counter social engineering attacks to safeguard critical information and assets effectively.
- Universal Relevance: Apply social engineering expertise across any industry or sector.
- Thriving Career Pathways: Pursue high-demand roles with global and remote work opportunities.
- Personal Development: Sharpen your critical thinking, problem-solving, and communication skills to excel in the dynamic field of cybersecurity.
Why zSecurity
- Lifelong access to the courses.
- Study at your own pace with our pre-recorded lessons.
- Trusted by over 707,998 students.
- Lectures are updated as the industry changes.
- Access to our team of experts.
- Ethical Hacking and Cybersecurity Community.
- Learn all elements of Ethical Hacking and Cybersecurity.
- Beginner friendly and welcoming.
Curriculum
- Introduction 3
- Teaser – Hacking An Android Phone & Accessing The CameraLecture1.1
- Introduction to Social EngineeringLecture1.203 min
- Course OverviewLecture1.304 min
- Preparation - Creating a Penetration Testing Lab 5
- Lab Overview & Needed SoftwareLecture2.106 min
- Initial PreparationLecture2.209 min
- Installing Kali Linux as a VM on WindowsLecture2.309 min
- Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
- Installing Kali Linux as a VM on LinuxLecture2.511 min
- Preparation - Linux Basics 3
- Kali Linux BasicsLecture3.105 min
- The Linux Terminal & Basic Linux CommandsLecture3.210 min
- More Powerful Linux Terminals with AI FeaturesLecture3.305 min
- Information Gathering 1
- IntroductionLecture4.1
- Information Gathering - Gathering Info About A Company/Website 5
- Maltego OverviewLecture5.107 min
- Discovering Domain Info & Emails Associated With TargetLecture5.207 min
- Discovering Information About Hosting Company, Support Team Emails & Admin EmailLecture5.307 min
- Discovering Files, Links, Websites & Other Companies Related To TargetLecture5.405 min
- Using The Gathered Info To Build An Attack StrategyLecture5.5
- Information Gathering - Gathering Info About A Person 4
- Discovering Websites, Links & Social Networking AccountsLecture6.109 min
- Discovering Twitter Friends & Associated AccountsLecture6.205 min
- Discovering Emails Of The Target’s FriendsLecture6.305 min
- Analysing The Gathered Info & Building An Attack StrategyLecture6.409 min
- Windows Malware 3
- Introduction to Windows MalwareLecture7.1
- Installing Windows as a Virtual MachineLecture7.206 min
- Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture7.305 min
- Windows Malware - Generating Undetectable Backdoors 9
- Backdoors and Payloads BasicsLecture8.112 min
- Creating Your Own BackdoorLecture8.208 min
- Listening for Backdoor ConnectionsLecture8.304 min
- Hacking Windows 11 Using Your Own BackdoorLecture8.406 min
- Introduction to The Fat RatLecture8.506 min
- Generating An Undetectable Backdoor for Windows – Method 2Lecture8.611 min
- Introduction to EmpireLecture8.708 min
- Creating a Windows Powershell Stager & Hacking Windows 10Lecture8.808 min
- Modifying Backdoor Source To Bypass All Anti-virus ProgramsLecture8.908 min
- Windows Malware - Spying 6
- Introduction to KeyloggersLecture9.106 min
- Creating A Remote KeyloggerLecture9.209 min
- Using A Remote Keylogger To Capture Key Strikes Including PasswordsLecture9.308 min
- Password Recovery BasicsLecture9.407 min
- Recovering Saved Passwords From Local MachineLecture9.503 min
- Recovering Saved Passwords From A Remote MachineLecture9.6
- Windows Malware - Enhancing Malware 3
- Bypassing All Anti-Virus Programs By Modifying Hex ValesLecture10.110 min
- Download & Execute PayloadLecture10.206 min
- Creating The Perfect Spying ToolLecture10.3
- Windows Malware - Creating Trojans 8
- Embedding Malware With Any File Type Like An Image Or PDFLecture11.110 min
- Running Malware Silently In The BackgroundLecture11.208 min
- Changing Trojan’s IconLecture11.308 min
- Spoofing File Extension From .exe to Anything Else (pdf, png ..etc)Lecture11.411 min
- Download & Execute Payload (Method 2)Lecture11.506 min
- Embedding Malware With Any File Type Like An Image Or PDF (Method 2)Lecture11.607 min
- Embedding a Backdoor In Microsoft Office DocumentLecture11.709 min
- Embedding Any Malware in a Microsoft Office DocumentLecture11.810 min
- Mac OS X Malware 8
- IntroductionLecture12.103 min
- Hacking Mac OS X Using A Meterpreter BackdoorLecture12.212 min
- Hacking Mac OS X Using An Empire StagerLecture12.307 min
- Converting Basic Backdoor To An ExecutableLecture12.404 min
- Embedding A Normal File With BackdoorLecture12.509 min
- Generating a Basic Trojan For Mac OS XLecture12.607 min
- Changing Trojan’s IconLecture12.706 min
- Configuring The Trojan To Run SilentlyLecture12.806 min
- Linux Malware 10
- Installing Ubuntu As a Virtual MachineLecture13.106 min
- Hacking Into Linux-Like Systems Using One CommandLecture13.209 min
- More Advanced Linux BackdoorLecture13.307 min
- Using A Remote Keylogger To Capture Key Strikes Including PasswordsLecture13.4
- Recovering Saved Passwords From A Local MachineLecture13.507 min
- Execute & Report PayloadLecture13.607 min
- Recovering Saved Passwords From A Remote MachineLecture13.707 min
- Embedding Evil Code In A Legitimate Linux Package – Part 1Lecture13.813 min
- Embedding Evil Code In A Legitimate Linux Package – Part 2Lecture13.905 min
- Backdooring a Legitimate Android AppLecture13.1012 min
- Delivery Methods 17
- IntroductionLecture14.1
- Mail Deliver – Setting up an SMTP ServerLecture14.206 min
- Mail Delivery – Spoofing EmailsLecture14.307 min
- Mail Delivery – Spoofing Email NameLecture14.406 min
- Mail Delivery – Spoofing Emails (method 2)Lecture14.510 min
- Hacking OS X & Linux Using Pure Social Engineering Without Sending Any FilesLecture14.610 min
- Creating A Replica Of Any Website / Login PageLecture14.706 min
- Stealing Login Info Using Fake A Login PageLecture14.8
- BeEF Overview & Basic Hook MethodLecture14.907 min
- Injecting BeEF’s Hook In Any WebpageLecture14.1005 min
- URL ManipulationLecture14.1110 min
- Luring Target Into Accessing Evil URL Without Direct InteractionLecture14.1211 min
- Basic BeEF CommandsLecture14.1304 min
- Stealing Credentials/Passwords Using A Fake Login PromptLecture14.1402 min
- Hacking Windows 10 Using A Fake UpdateLecture14.1505 min
- Hacking Mac OS X Using A Fake UpdateLecture14.1604 min
- Hacking Linux Using A Fake UpdateLecture14.1705 min
- Using The Above Attacks Outside The Local Network 4
- Overview of the SetupLecture15.106 min
- Ex1 – Generating a Backdoor That Works Outside The NetworkLecture15.205 min
- Configuring The Router To Forward Connections To KaliLecture15.307 min
- Ex2 – Using BeEF Outside The NetworkLecture15.406 min
- Post Exploitation 2
- IntroductionLecture16.102 min
- Upgrading Basic Shell Access To A Meterpreter/Empire AccessLecture16.209 min
- Post Exploitation - Meterpreter 8
- Meterpreter BasicsLecture17.106 min
- File System CommandsLecture17.205 min
- Maintaining Access (Persistence)Lecture17.308 min
- Spying – Capturing Key Strikes & Taking Screen ShotsLecture17.403 min
- Pivoting – Theory (What is Pivoting?)Lecture17.507 min
- Pivoting – Exploiting Devices on The Same Network As The Hacked ComputerLecture17.608 min
- Controlling Android Phone & Accessing Mic, Camera, Messages, File System & MoreLecture17.709 min
- Maintaining Access On OS XLecture17.810 min
- Post Exploitation - Empire 6
- Basics Of Empire AgentsLecture18.106 min
- File System CommandsLecture18.206 min
- Upload & Execute Shell CommandsLecture18.305 min
- Injecting a Backdoor Process In System ProcessesLecture18.410 min
- 2 Methods to Escalating Privileges On OS XLecture18.507 min
- Maintaining Access On OS XLecture18.6
- Security 4
- Detecting Fake/Spoofed EmailsLecture19.106 min
- How to Protect Against BeEF & Other Browser ExploitsLecture19.204 min
- Detecting Trojans ManuallyLecture19.306 min
- Detecting Trojans Using a SandboxLecture19.403 min
- Bonus Section 1
- Bonus Lecture – What’s Next?Lecture20.1
What you will learn
- Hack updated & patched systems (Windows, Linux, Apple Mac OS and Android).
- Generate undetectable backdoors for Windows, Apple Mac OS, Linux & Android.
- Steal passwords from Windows & Linux.
- Hack with Microsoft Office documents.
- Backdoor Android applications.
- Make evil files (backdoors / keyloggers) look and function like normal files (image, pdf or any other file type).
- Manually modify malware to bypass anti-virus programs.
- Advanced malware delivery techniques (fake pages, fake emails, indirect notifications, etc)
- Advanced post exploitation.
- Discover websites, companies, people, emails and social networking accounts associated with a person or a company.
- Install hacking lab & needed software (on Windows, Apple Mac OS and Linux)
- Install Kali Linux - a penetration testing operating system
- Install windows & vulnerable operating systems as virtual machines for testing.
- Linux basics
- Linux commands and how to interact with the terminal
- Build attack strategies based on the gathered info
- Generate a remote keylogger that logs every key strike entered on a target computer and sends reports by email.
- Backdoor Debian packages for Linux
- Generate Apple Mac OS backdoors that look and function like normal files (image, pdf ..etc).
- Hack Apple Mac OS and Linux computers by using a simple one line command.
- Send emails from ANY email account.
- Create fake websites that look exactly like any other website.
- Create a fake login page and use it to steal passwords.
- Use smart social engineering techniques to make the target person willingly use our fake website.
- Deliver malware as fake updates, fake installers ..etc.
- Read, write download, upload and execute files on compromised systems.
- Capture key strikes on compromised systems.
- Use a compromised computer as a pivot to hack other computers on the same network.
- Maintain your access to the hacked systems even after restart.
- Escalate your privileges to admin.
- Analyse files & detect undetectable malware.
- Use a sandbox to analyse undetectable malware.
Certification
After you finish the course, you will receive a Digital Certification that has a verifiable code of completion. The Certification includes hours studied on the course and does count towards your CPA hours. This Certification is also signed by Zaid, CEO of zSecurity.
Requirements
- Basic IT Skills.
- No Linux, programming or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory.
- Operating System: Windows / Apple Mac OS / Linux.
Who Is This For?
- Cybersecurity Professionals
- IT & Network Administrators
- Law Enforcement & Investigators
- Red Team & Blue Team Members
- Business Owners & Managers
- Privacy & Security Enthusiasts
- HR & Employee Training Teams
- Journalists & Activists
- Social Engineering & OSINT Enthusiasts
- Anyone Concerned About Cybersecurity
Your Ethical Hacking Journey with zSecurity
1. Purchase our Social Engineering Course
Choose the course that is most relevant to you! If you're a Beginner who wants to learn Ethical Hacking generally, we recommend "Learn Ethical Hacking from Scratch" as a good starting point.
2. Instant Access to your Course
Once you complete your purchase, you will receive a confirmation email. The course is accessible by logging into your account on zsecurity.org. You can find all the courses you have purchased in "My Account".
3. Learn about the Social Engineering at your own pace
Your courses never expire so you will have life-long access to the course materials and lessons, this means you can study at your own pace and return to previous lecturers to revise a previous topic even after completing.
4. Receive your zSecurity Digital Certification with proof of completion
After completing all the lessons in your course, you will receive a Digital Certification that has a verifiable code of completion.




Meet Your Instructor: Zaid
> Ethical Hacker
> Computer Scientist
> CEO of zSecurity
MY APPROACH TO LEARNING
“I focus on teaching practical skills that are essential and actively utilized by professionals in the field every day. My courses are highly practical but they don’t neglect the theory; I start with ensuring that students have a solid understanding of the fundamentals and the target system that we are trying to hack. Then we start hacking straight away! I teach everything through hands-on real-life examples and labs. No dry boring lectures.”
Purchase Options
Get the course on its own or included in a bundle
Reviews
![]() Shafique Ahmed ![]() I did Global C|EH but I found this course by Zaid Sabih is more useful and full of latest stuff. I really like this course and looking forward to do more course by Zaid Sabih. ![]() Jash Merchant ![]() The explanation is awesome , especially the notes and resources provided in between just makes everything easy to understand. Thanks a lot Sir Zaid. ![]() Phil Lutkovsky ![]() This guy is just the best at this... I am a course hoarder so I know what I am talking about. He may not cover ALL topics in the world, that would make this course 500 hours long, but the things he DOES cover he covers in great detail. ![]() Hossain Md Zakir ![]() Excellent course I have ever found online. Mr Zaid is very helpful and friendly Instructor. He made all the courses easy to understand for every level student. Thank you very much Mr Zaid for your best effort on online teaching. |
Get Professionally Certified in Ethical Hacking
There a range of professional certifications available, make sure you study hard!
Ethical Hacking Career Possibilities
There a range of professional certifications available, make sure you study hard!
Upgrade your Hacking Kit with Essential Tools
BadUSB-C
Cable

$24.99
BadUSB Keystoke Injection USB

$34.99
BadUSB Silent Intrusion Kit Plus

$74.97
$69.97
Hacker
Starter Kit







