Overview
COURSE DESCRIPTION
Enter the world of information security from a human-information perspective with the Social Engineering, Phishing, OSINT & Malware course on Courseinger. This course is designed to help you understand how social engineering, phishing, and intelligence gathering attacks work online, how to detect and prevent them, and the principles of defensive malware handling (initial analysis, damage assessment, and response procedures).
The focus of this course is educational and ethical: we teach you how to identify attacks, assess risks, and design defensive policies. We also cover how to conduct legitimate OSINT operations to gather public information useful in investigations, as well as the principles of handling malware samples in a protected sandbox for analysis and security purposes only. We do not teach or encourage malicious use.
🎯 Learning Outcomes:
Understanding social engineering tactics, phishing patterns, and methods for detecting them.
OSINT methodologies for gathering and analyzing legitimate public information for risk assessment.
Fundamental principles of malware analysis from an incident response perspective (sandboxing, behavioral demonstration, and threat characterization) – experiments conducted in a sandboxed environment only.
Designing policies and preventative measures for organizations (user awareness, email settings, DLP, MFA).
Writing professional investigative reports and incident response plans.
Constantly emphasizing ethics, legal compliance, and obtaining approvals before any testing or analysis.
Course Features
- Lectures 49
- Quiz 0
- Duration Lifetime access
- Skill level All levels
- Language English
- Students 8
- Certificate Yes
- Assessments Yes
Curriculum
- 9 Sections
- 49 Lessons
- Lifetime
- 01 - Introduction to metasploit, metasploit framework, penetration testing, oscpVirtualisation Platforms + Lab's Architecture Diagram + Install & Run Oracle VM VirtualBox + Installing Kali using the VMware Image - Step 1 + Installing Kali using the VMware Image - Step 2 + Installing Kali using the VMware Image - Step 3 + Installing Kali using the ISO file for VMware - Step 1 + Installing Kali using the ISO file for VMware - Step 2 + Installing Kali using the ISO file for VMware - Step 3 + Installing Kali on VirtualBox using the OVA file - Step 1 + Installing Kali on VirtualBox using the OVA file - Step 2 + Installing Kali on VirtualBox using the OVA file - Step 3 + Installing Kali using the ISO file for VirtualBox - Step 1 + Installing Kali using the ISO file for VirtualBox - Step 2 + Installing Kali using the ISO file for VirtualBox - Step 3 + Free Windows Operating Systems on VMware Fusion + Free Windows Operating Systems on Oracle VM VirtualBox + Windows Systems as Victim + Configuring NAT Network in Oracle VM VirtualBox + Connections of Virtual Machines20
- 1.1Virtualisation Platforms Lessons 12 Minutes
- 1.2Lab’s Architecture Diagram Lessons 22 Minutes
- 1.3Install & Run Oracle VM VirtualBox Lessons 35 Minutes
- 1.4Installing Kali using the VMware Image – Step 1 Lessons 44 Minutes
- 1.5Installing Kali using the VMware Image – Step 2 Lessons 55 Minutes
- 1.6Installing Kali using the VMware Image – Step 3 Lessons 65 Minutes
- 1.7Installing Kali using the ISO file for VMware – Step 1 Lessons 72 Minutes
- 1.8Installing Kali using the ISO file for VMware – Step 2 Lessons 87 Minutes
- 1.9Installing Kali using the ISO file for VMware – Step 3 Lessons 93 Minutes
- 1.10Installing Kali on VirtualBox using the OVA file – Step 1 Lessons 104 Minutes
- 1.11Installing Kali on VirtualBox using the OVA file – Step 2 Lessons 117 Minutes
- 1.12Installing Kali on VirtualBox using the OVA file – Step 3 Lessons 125 Minutes
- 1.13Installing Kali using the ISO file for VirtualBox – Step 1 Lessons 132 Minutes
- 1.14Installing Kali using the ISO file for VirtualBox – Step 2 Lessons 147 Minutes
- 1.15Installing Kali using the ISO file for VirtualBox – Step 3 Lessons 155 Minutes
- 1.16Free Windows Operating Systems on VMware Fusion Lessons 166 Minutes
- 1.17Free Windows Operating Systems on Oracle VM VirtualBox Lessons 173 Minutes
- 1.18Windows Systems as Victim Lessons 181 Minute
- 1.19Configuring NAT Network in Oracle VM VirtualBox Lessons 192 Minutes
- 1.20Connections of Virtual Machines Lessons 203 Minutes
- 02 - Social Engineering TerminologiesTerminologies Part 1 + Terminologies Part 22
- 03 - Creating Malware and Malware ToolsCreating Malware and Terminologies + SFvenom Part 1 + MSFvenom Part 2 + Veil Installation + Veil in Action + TheFatRat Installation + TheFatRat in Action + TheFatRat Overcoming a Problem8
- 3.1SFvenom Part 1 Lessons 215 Minutes
- 3.2MSFvenom Part 2 Lessons 33 Minutes
- 3.3Veil Installation Lessons 43 Minutes
- 3.4Veil in Action Lessons 56 Minutes
- 3.5TheFatRat Installation Lessons 65 Minutes
- 3.6TheFatRat in Action Lessons 712 Minutes
- 3.7TheFatRat Overcoming a Problem Lessons 81 Minute
- 3.8Creating Malware and Terminologies Lessons 14 Minutes
- 04 - Embedding MalwareEmbedding Malware in PDF + Embedding Malware in WORD + Embedding Malware in Firefox Add-on3
- 05 - Empire ProjectEmpire Installation + Empire in Action Part 1 + Empire in Action Part 23
- 06 - Exploiting Java VulnerabilitiesExploiting Java Vulnerabilities1
- 07 - Social Engineering ToolkitSocial Engineering Toolkit1
- 08 - Phishing and VishingSending Fake Emails - Phishing + Vishing - Voice Phishing2
- 09 - Information Gathering Through the InternetIntroduction + Using Search Engines & Google Hacking to Gather Information + Search Engine Tool SearchDiggity + Shodan + Gathering Information About the People + Web Archives + FOCA Fingerprinting Organisations with Collected Archives + The Harvester & Recon-NG + Maltego - Visual Link Analysis Tool9
- 9.1Introduction Lessons 17 Minutes
- 9.2Using Search Engines & Google Hacking to Gather Information Lessons 24 Minutes
- 9.3Search Engine Tool SearchDiggity Lessons 34 Minutes
- 9.4Shodan Lessons 43 Minutes
- 9.5Gathering Information About the People Lessons 54 Minutes
- 9.6Web Archives Lessons 62 Minutes
- 9.7FOCA Fingerprinting Organisations with Collected Archives Lessons 77 Minutes
- 9.8The Harvester & Recon-NG Lessons 84 Minutes
- 9.9Maltego – Visual Link Analysis Tool Lessons 98 Minutes
Instructor
Requirements
- Basic knowledge of information security and networking concepts. A device capable of running a virtual environment (VirtualBox/VMware) or accessing an isolated lab/server for sample analysis. A willingness and commitment to work within an ethical and legal framework—no testing without explicit authorization. Basic programming skills/scripts (useful but not essential) for basic data analysis.
Features
- Dual focus: Human aspect (Social Engineering/Phishing) and technical aspect (OSINT/Malware basics). Real-world case studies (provided for analysis and learning) without targeting actual systems. A secure sandboxed environment for analyzing malware behavior at an introductory level. Style templates and reports for incident response and OSINT analysis. Materials for designing in-house awareness campaigns and training effectiveness reports. Clear legal/ethical confirmation and guidance on how to obtain testing approvals.
Target audiences
- Cybersecurity professionals and protection officers (SOC, Incident Response). Entry-level cybercrime investigators and OSINT analysts. Information security managers and enterprise risk managers who want to understand the human dimension and social attacks. Anyone who wants to learn how to detect phishing attacks and develop effective awareness programs.





