One Stop Hacking Marathon OSCP Defensive Cloud Bug Bounty | Udemy

One Stop Hacking Marathon OSCP Defensive Cloud Bug Bounty | Udemy
English | Size: 27.33 GB
Genre: eLearning

Use the cloud to hack online accounts, computers, browsers and much more | No prior knowledge required

Welcome to my comprehensive course on using the cloud for hacking. With NO prior knowledge required, this course takes you from a beginner to an expert at launching advanced attacks from the cloud to hack online accounts and all operating systems (Windows, Linux and Apple Mac OS). That’s not all, you’ll also be able to use the cloud knowledge you acquire in this course to host your own websites and your own cloud applications.

This Learn Ethical Hacking Using The Cloud From Scratch course is highly practical but it won’t neglect the theory. We’ll start with basics of ethical hacking and cloud computing. Then we’ll dive and start using the cloud for hacking straight away. You’ll learn everything by example, by hacking online accounts, computers, and browsers, no boring dry lectures. By the end of the course you will have a strong foundation in cloud computing and ethical hacking.

What you’ll learn

80 videos (8:45 hours) teaching you how to use the cloud for hacking.
Generate phishing pages & Bypass 2FA / MFA.
Hack any account with web interface such as whatsapp, email accounts, etc.
Hack all operating systems from the cloud (Windows, Linux, Apple Mac OS).
60+ hands-on real-life hacking examples.
No prior knowledge required
Understand cloud concepts and use them for hacking.
Hack web browsers on all operating systems and devices.
Create trojans for Windows, Linux and Apple Mac OS.
Hack Windows using Discord.
Install & use Kali Linux from the cloud.
Deliver malware like an expert hacker using specialised cloud services.
Create a custom cross-platform download page to serve the right malware based on the target’s OS.
URL manipulation to include convincing words such as Facebook.
Generate convincing download links with safe extensions such as .pdf.
Launch ransomware attacks.
Find exact location of anyone using a link.
Clone / replicate any website on the internet.
Read, write download, upload and execute files on compromised systems.
Capture keystrikes on a compromised system.
Steal sensitive info from hacked computers.
Access webcam and keyboard of hacked computers
Steal Windows passwords
Install a GUI on cloud servers and access their desktop.
Understand DNS and the different record types.
Use Amazon’s cloud service AWS.
Link a domain name to cloud servers.
Enable HTTPS on cloud hacking tools.
Botnet basics and concepts.
Use C2 / C&C to Hack Windows, Linux and Apple Mac OS
PHP basics.
Javascript basics
AI Basics
Linux basics.
Linux commands.
How to use the Linux terminal.

Who this course is for:
Anybody interested in ethical hacking or red teaming or penetration testing
Hackers who want to learn how to use the cloud for hacking.
Anybody interested in cloud comuting



If any links die or problem unrar, send request to

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.