The Complete Social Engineering, Phishing, OSINT & Malware
- All prices mentioned above are in United States dollar.
- This product is available at Udemy.
- At udemy.com you can purchase The Complete Social Engineering, Phishing, OSINT & Malware for only $15.00
- The lowest price of The Complete Social Engineering, Phishing, OSINT & Malware was obtained on September 18, 2025 12:44 pm.
Set Lowest Price Alert
×
Notify me, when price drops
Set Alert for Product: The Complete Social Engineering, Phishing, OSINT & Malware - $15.00

Price history
×
Price history for The Complete Social Engineering, Phishing, OSINT & Malware | |
---|---|
Latest updates:
|
|
Add to wishlistAdded to wishlistRemoved from wishlist 0

The Complete Social Engineering, Phishing, OSINT & Malware
$74.99
Description
Price history for The Complete Social Engineering, Phishing, OSINT & Malware | |
---|---|
Latest updates:
|
|
Didn't find the right price? Set price alert below
Set Alert for Product: The Complete Social Engineering, Phishing, OSINT & Malware - $15.00

The Complete Social Engineering, Phishing, OSINT & Malware
★★★★★
$15.00 in stock
Udemy.com
as of September 18, 2025 12:44 pm
Learn how hackers hack Windows, Linux & Android by using Social Engineering and protect yourself from phishing attacks

Created by:
Muharrem AYDIN
Computer Engineer, Ethical Hacking, Cyber Security Expert
Computer Engineer, Ethical Hacking, Cyber Security Expert

Created by:
OAK Academy Team
instructor
instructor
Rating:4.51 (6996reviews)
23544students enrolled
What Will I Learn?
- Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system.
- Becoming an ethical hacker involves learning at least one programming language and having a working knowledge of other common languages like Python, SQL, C++
- Many hackers use the Linux operating system (OS) because Linux is a free and open-source OS, meaning that anyone can modify it. It’s easy to access.
- Ethical hacking is legal because the hacker has full, expressed permission to test the vulnerabilities of a system
- The Certified Ethical Hacker (CEH) certification exam supports and tests the knowledge of auditors, security officers, site administrators, security.
- Learn how to create undetectable malware using MSFvenom, Veil, TheFatRat, Empire Project, etc
- Passing the Certified Information Security Manager (CISM) exam indicates that the credentialed individual is an expert in the governance of information security
- The different types of hackers include white hat hackers who are ethical hackers and are authorized to hack systems, black hat hackers who are cybercriminals.
- Learn embedding malware in pdf and doc files
- Learn the working mechanism of Social Engineering Toolkit
- Learn social engineering techniques and terminologies
- Learn about the Metasploit Framework
- Learn how to achieve a realistic "vishing" attack: hacking people by phone
- Learn how to collect information about people by using OSINT (Open Source Intelligence)
- Learn how to use Empire
- Learn how to use FOCA, Web Archieve, The Harvester & Recon-NG
- ethical hacking
- cyber security
- android hacking
- hacking
- Ethical Intelligence
- Ethical Hacker
Requirements
- 4 GB (Gigabytes) of RAM or higher (8 GB recommended)
- 64-bit system processor is mandatory
- 10 GB or more disk space
- Enable virtualization technology on BIOS settings, such as “Intel-VTx”
- Modern Browsers like Google Chrome (latest), Mozilla Firefox (latest), Microsoft Edge (latest)
- All items referenced in this course are Free
- A computer for installing all the free software and tools needed to practice
- A strong desire to understand hacker tools and techniques
- Be able to download and install all the free software and tools needed to practice
- A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
- Nothing else! It’s just you, your computer and your ambition to get started today
Target audience
- Anyone who wants to learn social engineering tools and techniques
- Anyone who wants to learn about how malware is created and distributed
- Cyber Security Consultants who will support organizations for creating a more secure environment
- People who are willing to make a career in Cyber Security
- Anyone who wants to be a White Hat Hacker
Price History
Price history for The Complete Social Engineering, Phishing, OSINT & Malware | |
---|---|
Latest updates:
|
|
Reviews (0)
User Reviews
0.0 out of 5
★★★★★
0
★★★★★
0
★★★★★
0
★★★★★
0
★★★★★
0
Write a review
There are no reviews yet.