Learn Social Engineering From Scratch

User Avatar
(10 reviews)
All levels
12 hours
$195.00 $99.00

Learn how to hack secure Windows, Linux, OSX, and Android systems

Do you want to become an expert hacker? How about launching a new career in the world of professional penetration testing or ethical hacking? If so, then you have to master social engineering!

This course is designed for beginners with no previous knowledge. The great news is that you don’t need prior programming or hacking knowledge – I assume you’re starting from scratch and by the end of the course you’ll be at a high level in social engineering being able hack into all major operating systems (windows, OS X, Linux and Android) like black-hat hackers and secure yourself from hackers.

The difference is, you’ll be doing it for the good of your company or clients. Plus, you’ll benefit from the recognition that comes with being skilled in this high-demand field.

Learn Social Engineering From Scratch course content

Learn advanced Open Source Intellegence (OSINT)
Target all operating systems (Windows, Linux, OS X and Android)
Learn powerful delivery methods
Learn advanced post exploitation techniques

Why is this course so in demand?

Lifetime access to course materials and videos
Set the pace of your own study
Learn the way that best suits you
Get answers from our Support Team within 15 hours
Verifiable zSecurity certificate of completion
Unlimited updates to course materials and videos

Plus! Free 1-month VIP membership with:

Live mentoring and Q&A session with course instructor and CTO, Zaid
Instant support from community members through our private discord channel
Daily updates with the latest tutorials and news from the hacking world
Daily resources like CTFs, bug bounty programs, onion services and more
Access our VIP community and connect with like-minded people
Discounts and offers on other zSecurity products and services

Here's how it works

This course is focused on the practical side of social engineering without neglecting the theory, first you’ll learn how to install the needed software (on Windows, Linux and Mac OS X), then the course is divided into a number of sections to represent the steps you’d take to successfully hack a target using social engineering.

All the attacks in this course are practical attacks that work against real computers, in each technique you will understand the theory behind it and how it works, then you’ll learn how to use that technique in a real life scenario.

By the end of the course you’ll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What do you need to complete the Learn Social Engineering From Scratch course?

Basic Information Technology knowledge
No Linux, programming or hacking knowledge
Computer with a minimum of 4GB RAM/Memory
Operating System: Windows / OS X / Linux
$195.00 $99.00


10 ratings
  • Avatar

    The lectures are well taught and explanation are perfect,simple and easy to understand.Well prepared.I have already registered for another course expecting to get the same well planned content. Zaid 5 star no doubt.

  • Femi

    I bought 3 course, and they have been eye opening so far. Amazing instructor.


  • Introduction 3

  • Preparation - Creating a Penetration Testing Lab 4

    • Lecture2.1
      Lab Overview & Needed Software 03 min
    • Lecture2.2
      Installing Kali 2020 As a Virtual Machine 11 min
    • Lecture2.3
      Installing Windows As a Virtual Machine 03 min
    • Lecture2.4
      Installing Ubuntu As a Virtual Machine 07 min
  • Preparation - Linux Basics 3

    • Lecture3.1
      Basic Overview Of Kali Linux 05 min
    • Lecture3.2
      The Linux Terminal & Basic Linux Commands 11 min
    • Lecture3.3
      Creating & Using Snapshots 05 min
  • Information Gathering 1

  • Information Gathering - Gathering Info About A Company/Website 5

    • Lecture5.1
      Maltego Overview 06 min
    • Lecture5.2
      Discovering Domain Info & Emails Associated With Target 07 min
    • Lecture5.3
      Discovering Information About Hosting Company, Support Team Emails & Admin Email 07 min
    • Lecture5.4
      Discovering Files, Links, Websites & Other Companies Related To Target 05 min
    • Lecture5.5
      Using The Gathered Info To Build An Attack Strategy 04 min
  • Information Gathering - Gathering Info About A Person 4

    • Lecture6.1
      Discovering Websites, Links & Social Networking Accounts 09 min
    • Lecture6.2
      Discovering Twitter Friends & Associated Accounts 05 min
    • Lecture6.3
      Discovering Emails Of The Target’s Friends 04 min
    • Lecture6.4
      Analysing The Gathered Info & Building An Attack Strategy 09 min
  • Windows Malware 1

  • Windows Malware - Generating Undetectable Backdoors 10

    • Lecture8.1
      Installing Veil Framework 05 min
    • Lecture8.2
      Veil Overview & Payloads Basics 07 min
    • Lecture8.3
      Generating An Undetectable Backdoors For Windows 10 min
    • Lecture8.4
      Listening For Incoming Connections 07 min
    • Lecture8.5
      Hacking A Windows 10 Machine Using The Generated Backdoor 07 min
    • Lecture8.6
      Introduction to The Fat Rat 06 min
    • Lecture8.7
      Generating An Undetectable Backdoor for Windows – Method 2 11 min
    • Lecture8.8
      Introduction to Empire 09 min
    • Lecture8.9
      Creating a Windows Powershell Stager & Hacking Windows 10 07 min
    • Lecture8.10
      Modifying Backdoor Source To Bypass All Anti-virus Programs 08 min
  • Windows Malware - Spying 6

    • Lecture9.1
      Introduction to Keyloggers 06 min
    • Lecture9.2
      Creating A Remote Keylogger 09 min
    • Lecture9.3
      Using A Remote Keylogger To Capture Key Strikes Including Passwords 07 min
    • Lecture9.4
      Password Recovery Basics 07 min
    • Lecture9.5
      Recovering Saved Passwords From Local Machine 03 min
    • Lecture9.6
      Recovering Saved Passwords From A Remote Machine 12 min
  • Windows Malware - Enhancing Malware 2

  • Windows Malware - Creating Trojans 9

    • Lecture11.1
      Download & Execute Payload 06 min
    • Lecture11.2
      Embedding Evil Files With Any File Type Like An Image Or PDF 10 min
    • Lecture11.3
      Running Evil Files Silently In The Background 09 min
    • Lecture11.4
      Changing Trojan’s Icon 08 min
    • Lecture11.5
      Spoofing File Extension from .exe to anything else (pdf, png ..etc) 11 min
    • Lecture11.6
      Download & Execute Payload (Method 2) 06 min
    • Lecture11.7
      Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2) 07 min
    • Lecture11.8
      Embedding backdoor In A Legitimate Microsoft Office Document 09 min
    • Lecture11.9
      Embedding Any Evil File In A Legitimate Microsoft Office Document 10 min
  • Mac OS X Malware 9

    • Lecture12.1
      Introduction 03 min
    • Lecture12.2
      Hacking Mac OS X Using A Meterpreter Backdoor 12 min
    • Lecture12.3
      Hacking Mac OS X Using An Empire Stager 06 min
    • Lecture12.4
      Converting Basic Backdoor To An Executable 03 min
    • Lecture12.5
      Embedding A Normal File With Backdoor 09 min
    • Lecture12.6
      Generating a Basic Trojan For Max OS X 07 min
    • Lecture12.7
      Changing Trojan’s Icon 06 min
    • Lecture12.8
      Configuring The Trojan To Run Silently 06 min
    • Lecture12.9
      Embedding Backdoor In A Legitimate Microsoft Office Document 06 min
  • Linux Malware 9

    • Lecture13.1
      Hacking Into Linux-Like Systems Using One Command 09 min
    • Lecture13.2
      More Advanced Linux Backdoor 06 min
    • Lecture13.3
      Using A Remote Keylogger To Capture Key Strikes Including Passwords 10 min
    • Lecture13.4
      Recovering Saved Passwords From A Local Machine 07 min
    • Lecture13.5
      Execute & Report Payload 07 min
    • Lecture13.6
      Recovering Saved Passwords From A Remote Machine 07 min
    • Lecture13.7
      Embedding Evil Code In A Legitimate Linux Package – Part 1 12 min
    • Lecture13.8
      Embedding Evil Code In A Legitimate Linux Package – Part 2 05 min
    • Lecture13.9
      Backdooring a Legitimate Android App 12 min
  • Delivery Methods 15

    • Lecture14.1
      Introduction 02 min
    • Lecture14.2
      Mail Deliver – Setting up an SMTP Server 07 min
    • Lecture14.3
      Mail Delivery – Spoofing Emails 12 min
    • Lecture14.4
      Mail Delivery – Spoofing Emails (method 2) 08 min
    • Lecture14.5
      Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files 10 min
    • Lecture14.6
      Creating A Replica Of Any Website / Login Page 06 min
    • Lecture14.7
      Stealing Login Info Using Fake A Login Page 10 min
    • Lecture14.8
      BeEF Overview & Basic Hook Method 07 min
    • Lecture14.9
      Injecting BeEF’s Hook In Any Webpage 05 min
    • Lecture14.10
      Luring Target Into Accessing Evil URL Without Direct Interaction 11 min
    • Lecture14.11
      Basic BeEF Commands 04 min
    • Lecture14.12
      Stealing Credentials/Passwords Using A Fake Login Prompt 02 min
    • Lecture14.13
      Hacking Windows 10 Using A Fake Update 05 min
    • Lecture14.14
      Hacking Mac OS X Using A Fake Update 04 min
    • Lecture14.15
      Hacking Linux Using A Fake Update 05 min
  • Using The Above Attacks Outside The Local Network 4

    • Lecture15.1
      Overview of the Setup 06 min
    • Lecture15.2
      Ex1 – Generating a Backdoor That Works Outside The Network 05 min
    • Lecture15.3
      Configuring The Router To Forward Connections To Kali 07 min
    • Lecture15.4
      Ex2 – Using BeEF Outside The Network 06 min
  • Post Exploitation 2

    • Lecture16.1
      Introduction 02 min
    • Lecture16.2
      Upgrading Basic Shell Access To A Meterpreter/Empire Access 09 min
  • Post Exploitation - Meterpreter 9

    • Lecture17.1
      Meterpreter Basics 06 min
    • Lecture17.2
      File System Commands 05 min
    • Lecture17.3
      Maintaining Access Basic Methods 05 min
    • Lecture17.4
      Maintaining Access – Using a Reliable & undetectable Method 07 min
    • Lecture17.5
      Spying – Capturing Key Strikes & Taking Screen Shots 03 min
    • Lecture17.6
      Pivoting – Theory (What is Pivoting?) 07 min
    • Lecture17.7
      Pivoting – Exploiting Devices on The Same Network As The Hacked Computer 08 min
    • Lecture17.8
      Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More 09 min
    • Lecture17.9
      Maintaining Access On OS X 10 min
  • Post Exploitation - Empire 6

    • Lecture18.1
      Basics Of Empire Agents 06 min
    • Lecture18.2
      File System Commands 07 min
    • Lecture18.3
      Upload & Execute Shell Commands 04 min
    • Lecture18.4
      Injecting Backdoor Process In System Processes 09 min
    • Lecture18.5
      2 Methods to Escalating Privileges On OS X 07 min
    • Lecture18.6
      Maintaining Access On OS X 05 min
  • Security 4

    • Lecture19.1
      Detecting Fake/Spoofed Emails 06 min
    • Lecture19.2
      How to Protect Against BeEF & Other Browser Exploits 04 min
    • Lecture19.3
      Detecting Trojans Manually 05 min
    • Lecture19.4
      Detecting Trojans Using a Sandbox 03 min
  • Bonus Section 1

    • Lecture20.1
      Bonus Lecture – What’s Next?

Your instructor

Zaid Sabih

Ethical Hacker, Pentester & Computer Scientist

Zaid Al-Quraishi is an ethical hacker, computer scientist, and founder of zSecurity. He studied Computer Science at University College Dublin, graduating May 2016. Zaid has a strong background and experience in ethical hacking, starting with video tutorials in 2009 in an ethical hacking community, iSecur1ty.org. He also worked as a penetration tester (pentester) for this company. In 2013 he started teaching his first course online in Arabic which received extremely positive feedback. This motivated him to create an English version of the course. The English course became the most popular and top paid course on Udemy for almost a year, which further motivated Zaid to design and teach more courses on ethical hacking. He now offers a number of courses on ethical hacking and more than 200,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity. Zaid says: "I just love hacking and breaking the rules but don't get me wrong, I am an ethical hacker!"