Learn Ethical Hacking Using the Cloud From Scratch

Use the cloud to hack online accounts, computers, browsers and much more

   Watch Promo

What you'll learn

  • Generate phishing pages & Bypass 2FA / MFA.
  • Hack any account with web interface such as whatsapp, email accounts, etc.
  • Hack all operating systems from the cloud (Windows, Linux, Apple Mac OS).
  • 60+ hands-on real-life hacking examples.
  • No prior knowledge required
  • Understand cloud concepts and use them for hacking.
  • Hack web browsers on all operating systems and devices.
  • Create trojans for Windows, Linux and Apple Mac OS.
  • Hack Windows using Discord.
  • Install & use Kali Linux from the cloud.
  • Deliver malware like an expert hacker using specialised cloud services.
  • Create a custom cross-platform download page to serve the right malware based on the target's OS.
  • URL manipulation to include convincing words such as Facebook.
  • Generate convincing download links with safe extensions such as .pdf.
  • Launch ransomware attacks.
  • Find exact location of anyone using a link.
  • Clone / replicate any website on the internet.
  • Read, write download, upload and execute files on compromised systems.
  • Capture keystrikes on a compromised system.
  • Steal sensitive info from hacked computers.
  • Access webcam and keyboard of hacked computers
  • Steal Windows passwords
  • Install a GUI on cloud servers and access their desktop.
  • Understand DNS and the different record types.
  • Use Amazon's cloud service AWS.
  • Link a domain name to cloud servers.
  • Enable HTTPS on cloud hacking tools.
  • Botnet basics and concepts.
  • Use C2 / C&C to Hack Windows, Linux and Apple Mac OS
  • PHP basics.
  • Javascript basics
  • AI Basics
  • Linux basics.
  • Linux commands.


Requirements

  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory.
  • Operating System: Windows / Apple Mac OS / Linux.


Description

Welcome to my comprehensive course that will teach you how to use the cloud for hacking. With NO prior knowledge required, this course takes you from a beginner to an expert at launching advanced attacks from the cloud. Giving you the ability to hack online accounts, web browsers, bypass two or multi factor authentication, and gain full remote control over all operating systems (Windows, Linux and Apple Mac OS) from within the cloud. That's not all, you'll also be able to use the cloud knowledge you acquire in this course to host your own websites and your own cloud applications.

This course is highly practical but it won't neglect the theory. We'll start with basics of ethical hacking and cloud computing. Then we'll dive and start using the cloud for hacking straight away. You'll learn everything by example, by hacking online accounts, computers, and browsers, no boring dry lectures. By the end of the course you will have a strong foundation in cloud computing and ethical hacking.

To achieve this the course is divided into a number of sections, each aims to teach you a specific hacking technique! You'll first learn the cloud concepts related to this technique, then you'll learn how to use the cloud to hack computers, phones, browsers, online accounts and much more. As we do this I will also introduce you to different hacking concepts, tools and techniques. Everything will be taught through examples and hands-on practicals, there will be no useless or boring lectures!

All the techniques in this course are practical and work against real systems, you'll understand the whole mechanism of each technique first, then you'll learn how to use it to hack from the cloud. Therefore by the end of the course you'll be able to modify these techniques to launch more powerful attacks, and adopt them to suit different situations and different scenarios .

As mentioned this course will will teach you both ethical hacking and cloud computing at the same time, here are some of the topics that will be covered in the course:

Hacking topics:

  • Phishing basics + advanced.
  • Clone / replicate any website on the internet.
  • Bypass two or multi factor authentication (2FA / MFA).
  • Hacking online accounts such as Whatsapp accounts, email accounts, etc.
  • Hacking Windows, Apple Mac OS and Linux from the cloud.
  • Creating backdoors for Windows, Apple Mac OS and Linux.
  • Creating trojans for Windows, Apple Mac OS and Linux.
  • Hacking web browsers on all operating systems and devices.
  • Stealing credentials using fake prompts .
  • Stealing sensitive info from hacked computers.
  • Accessing system resources such as the keyboard and camera from the cloud.
  • Advanced malware delivery using specialised cloud services.
  • Cross-platform download page to serve the right malware based on the target's OS.
  • URL manipulation to include convincing words such as Facebook.
  • Generating convincing download links with safe extensions such as .pdf.
  • Launching ransomware attacks from the cloud.
  • Tracking any device from the cloud using a link.
  • Read, write download, upload and execute files on compromised systems.
  • Botnet basics and concepts.

Cloud topics:

  • Install & use Kali Linux from the cloud.
  • Cloning websites on the internet.
  • Install a GUI on cloud servers and access their desktop.
  • Hosting your own websites and cloud applications.
  • Enabling HTTPs.
  • Understand DNS and the different record types.
  • Use Amazon's cloud service AWS.
  • Configuring firewall rules.
  • Link a domain name to cloud servers.
  • SSH basics.
  • FTP and SFTP basics.
  • Apache2 basics.
  • Novnc.

Other topics:

  • PHP basics.
  • Javascript basics
  • AI Basics
  • Linux basics.
  • Linux commands.
  • How to use the Linux terminal.

Throughout the course you'll learn how to use use the following tools to achieve the above:

  • Kali Linux
  • AWS.
  • SSH.
  • Certbot
  • Evilginx.
  • Pwndrop.
  • Filezilla.
  • Openvnc.
  • Empire.
  • Starkiller
  • Distopia
  • Netcat.
  • BeEF.

Checkout the curriculum and the course teaser for more info!

Notes:

This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.


Who this course is for:

  • Anybody interested in ethical hacking or red teaming or penetration testing
  • Hackers who want to learn how to use the cloud for hacking.
  • Anybody interested in cloud comuting


Your Instructor


ZAID AL QURAISHI
ZAID AL QURAISHI

My name is Zaid Al-Quraishi , I am an ethical hacker, pentester and a computer scientist. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.

I have a very good experience in ethical hacking. I started making video tutorials since 2009 in an ethical hacking website (iSecuri1ty), I received very good feedback for my tutorials which lead to promoting me as an editor in the website. I also work in the penetration testing team of iSecur1ty.

In 2013 I started teaching my first course online in the training center in iSecur1ty, again this course received amazing feedback for learners, which motivated me to create an English version of this course.

The english course was the most popular and the top paid course in Udemy for almost a year, again the feedback was amazing, therefore I decided to make more courses on ethical hacking, so I released a number of other courses which are doing just as good as that one.

My method of teaching is mostly by example, so I usually start by explaining the theory behind each technique, then I show you how it actually works in a real life situation.


Join Today & Get Access To This Course & Every Resource You Need Grow Your Cyber Skills & Advance Your Career. Beginner & Expert Training.

Course Curriculum


  Training Overview
Available in days
days after you enroll
  Phishing - Bypassing 2-Multi Factor Authentication (2FA-MFA)
Available in days
days after you enroll
  Accessing Cloud Server Desktop
Available in days
days after you enroll
  Command & Control Servers (C2-C&C)
Available in days
days after you enroll
  Audio
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Become A Member And Unlock Unlimited Access To This Course Plus Over 1,000+ Top Cyber Security Classes, Virtual Labs, Practice Tests, And Exam Simulations.

Designed To Help You Expand Your Skill Set And Propel Your Career Forward. Whether You're Just Starting Out Or You're An Industry Expert, There's Something Here For Everyone. Let's Grow Together!