Get your team access to top Uplyrn courses anytime, anywhere.
Overview
Learn how to process malware threats, perform social engineering, and start sniffing to advance your cyber security career today!
Hackers can access our sensitive information by phishing, vishing, social engineering, putting malware, trojan horse to our devices. With the increase in the number of platforms, there may be an enormous amount of backdoors in which hackers acquire our information and exploit them.
In this course, you will learn all aspects of social engineering with different techniques and tools. At the end of the course, you will easily understand the necessary information about social engineering and take necessary precautions for yourself or for your organization.
This course includes the beginner levels so you don’t need to have previous knowledge of social engineering, reverse engineering, malware, the Metasploit framework, or information security. You’ll learn how to ethically apply social engineering.
Thank you for learning about the course and we hope you love it!
What you'll learn
Malware fundamentals
C fundamentals of hacking programming and files using Kali Linux
Basics of Python coding for networking and hacking with Kali Linux
Generating payloads with TheFatRat and Kali Linux
Fundamentals of sniffing and sniffing tools
Netsniff - ng - Ettercap - Wireshark
and more…
Requirements
This course was designed for total beginners and there is no particular knowledge requirement.
Overview
Learn how to process malware threats, perform social engineering, and start sniffing to advance your cyber security career today!
Hackers can access our sensitive information by phishing, vishing, social engineering, putting malware, trojan horse to our devices. With the increase in the number of platforms, there may be an enormous amount of backdoors in which hackers acquire our information and exploit them.
In this course, you will learn all aspects of social engineering with different techniques and tools. At the end of the course, you will easily understand the necessary information about social engineering and take necessary precautions for yourself or for your organization.
This course includes the beginner levels so you don’t need to have previous knowledge of social engineering, reverse engineering, malware, the Metasploit framework, or information security. You’ll learn how to ethically apply social engineering.
Thank you for learning about the course and we hope you love it!
What you'll learn
Requirements
This course was designed for total beginners and there is no particular knowledge requirement.
Course Content
1 Section 4 Lectures 1h 6m total length
All Comments