Learn Social Engineering Testing From Scratch
Master the art of social engineering to ethically test and secure systems. This comprehensive course covers information gathering, creating undetectable malware, delivery methods, post-exploitation techniques, and practical defenses against attacks.

What Youβll Learn
This social engineering testing course will teach you:
- Social Engineering Techniques: Learn methods to ethically exploit human weaknesses in security systems.
- Undetectable Malware: Create backdoors, keyloggers, and Trojans for Windows, Linux, macOS, and Android.
- Post-Exploitation Skills: Spy on systems, escalate privileges, and maintain persistent access.
- Fake Login Pages: Steal credentials using convincingly crafted phishing sites.
- Information Gathering: Discover techniques for profiling companies, websites, and individuals for smarter attacks.
- Advanced Delivery Methods: Use fake websites, emails, and updates to deliver malicious payloads.
- Bypass Techniques: Learn methods to evade anti-virus detection and disguise malware as legitimate files.
- Security Countermeasures: Analyze attacks, detect malware, and use sandboxes to protect systems.
Included in the Social Engineering Testing Course
Suitable for the Following Careers
Course Content
Section 0. Welcome
Section 1. Preparation - Creating a Penetration Testing Lab
Section 2. Preparation - Linux Basics
Section 3. Information Gathering
Section 4. Information Gathering - Gathering Info About A Company/Website
Section 5. Information Gathering - Gathering Info About A Person
Section 6. Windows Malware
Section 7. Windows Evil Files - Generating Undetectable Backdoors
Section 8. Windows Evil Files - Spying
Section 9. Windows Evil Files - Enhancing Malware
Section 10. Windows Evil Files - Creating Trojans
Section 11. Mac OS X Malware
Section 12. Linux Malware
Section 13. Delivery Methods
Section 14. Using The Above Attacks Outside The Local Network
Section 15. Post Exploitation
Section 16. Post Exploitation - Meterpreter
Section 17. Post Exploitation - Empire
Section 18. Security
Audio Version of Training
OPEN FULL CURRICULUM
Requirements
Description of the Social Engineering Testing Course
Social engineering leverages human vulnerabilities to bypass technical defenses, making it a critical area of ethical hacking. This course equips you with practical skills to ethically test, exploit, and secure against these attacks, covering all major operating systems, including Windows, macOS, Linux, and Android.
Youβll progress from information gathering and malware creation to advanced delivery methods and post-exploitation tasks. Gain expertise in building undetectable malware, crafting convincing phishing campaigns, and securing systems. Learn to protect against these attacks with malware analysis, sandboxing, and defensive strategies.
- Learn information gathering techniques to profile companies, websites, and individuals for smarter attacks.
- Create undetectable malware, including backdoors, keyloggers, and Trojans, for multiple platforms.
- Use advanced delivery techniques like fake websites, phishing emails, and fake updates to deploy malware.
- Master post-exploitation skills, including privilege escalation, persistence, and spying.
- Discover methods to bypass anti-virus detection and disguise malicious files as legitimate ones.
- Build fake login pages to ethically steal credentials for testing.
- Analyze and defend against social engineering attacks using malware analysis and sandboxing.
By the end of this course, youβll have the tools and expertise to ethically exploit and secure against social engineering vulnerabilities, helping organizations fortify their defenses. Enroll now to master this essential skill set!
Who Is This Course For
This course is for aspiring ethical hackers, cybersecurity professionals, and IT enthusiasts eager to master social engineering techniques. Itβs ideal for beginners or professionals seeking practical skills to exploit and defend against human vulnerabilities in real-world scenarios.
Course Instructor
Zaid Al-Quraishi is an accomplished ethical hacker, pentester, and computer scientist passionate about hacking and breaking the rules ethically. With extensive experience in ethical hacking, Zaid began creating video tutorials for iSecur1ty in 2009, earning positive feedback that led to his promotion as an editor. He is also a member of iSecur1ty's penetration testing team.
In 2013, Zaid launched his first online course at iSecur1ty's training center, receiving outstanding learner reviews. Motivated by this success, Zaid developed additional courses, all of which have been well-received.
Zaid's teaching method is primarily example-based. He begins by explaining the theory behind each technique and then demonstrates its application in real-life situations, providing learners with a comprehensive understanding of ethical hacking practices.
Read More
Read Less
Testimonials
Gulab Basha S.
Zaid's Social Engineering course is an absolute game-changer! It's not just about learning how attackers exploit vulnerabilities; it equips you with the knowledge and tools to proactively defend yourself and your organisation. Zaid's engaging delivery and real-world examples make even complex topics clear and memorable.
Purav L
This Is a good Course For social engineering basics and will give you pretty much knowledge to perform the attacks.
Thank you.
Ramon V.
This is another great course by Zaid. It is packed with a lot of information and tool making techniques. I really enjoyed this course. Thank you.
Show More
Show Less