Companies Home Search Profile

The Complete Android Ethical Hacking Practical Course C|AEHP

Focused View

Debayan Dey

5:37:10

10 View
  • 1 - Disclaimer and Note.html
  • 1 - Self Test.html
  • 2 - 5 Mins Reading Material Before we Start.html
  • 3 - Introduction.mp4
    01:03
  • 3 - What is Ethical Hacking.txt
  • 4 - What is Termux.mp4
    02:51
  • 5 - What is Shell.mp4
    01:02
  • 6 - Why Termux.mp4
    01:59
  • 7 - Installation.mp4
    00:49
  • 8 - what is FDroid.mp4
    01:02
  • 9 - Package Management.mp4
    01:21
  • 10 - Installing TERMUX from Google Play Store.mp4
    02:49
  • 11 - Storage Setup Update and Upgrade Command.mp4
    03:56
  • 12 - Why we use apt.mp4
    04:47
  • 13 - apt Command in Linux.html
  • 14 - Remove Package.mp4
    01:30
  • 15 - You can also download Hackers Keyboard from Google Play Store.html
  • 16 - Package Management Basics apt yum dnf pkg.html
  • 17 - Optional Reading Material for Knowledge Package Management Systems.html
  • 18 - Optional Reading Material Update Package Lists.html
  • 19 - aptshow.mp4
    01:37
  • 20 - hidden files versions and CD commands.mp4
    02:00
  • 21 - Nano and Cat commands.mp4
    02:57
  • 22 - PWD and touch command.mp4
    03:52
  • 23 - mkdir command.mp4
    01:03
  • 24 - use of cd command.mp4
    02:27
  • 25 - use of mv command.mp4
    04:56
  • 26 - use of rm command.mp4
    02:21
  • 27 - mix use of cp mv and touch command.mp4
    02:45
  • 28 - use of uname command.mp4
    01:07
  • 29 - use of ifconfig command.mp4
    01:52
  • 30 - know your IP address.mp4
    01:04
  • 31 - use of Ping command.mp4
    01:11
  • 32 - use of chmod command.mp4
    02:56
  • 33 - use of cal and proc command.mp4
    03:24
  • 34 - use of git clone and wget command.mp4
    03:29
  • 35 - Various Other Useful Commands.html
  • 2 - Advanced TermuxLinux Commands Learning in the form of Quiz for Knowledge.html
  • 36 - What is Penetration Testing.mp4
    01:49
  • 37 - Optional Advanced Understanding of Penetration Testing and its Stages.html
  • 38 - What is Metasploit Framework and its History.mp4
    02:07
  • 39 - Optional Reading Material for Metasploit Framework.html
  • 40 - Basic Terminologies Vulnerability.mp4
    01:37
  • 41 - Basic Terminologies Exploit.mp4
    02:12
  • 42 - Basic Terminologies Payload.mp4
    02:45
  • 43 - basic architecture of Metasploit.mp4
    01:43
  • 44 - Module in Architecture of Metasploit.mp4
    02:01
  • 45 - What is Shell Bind Shell Reverse Shell.mp4
    02:10
  • 46 - Initial Steps ways to Prevent these Attacks and Conclusion.mp4
    02:26
  • 47 - READING Material What is Social Engineering.html
  • 48 - installation of CPUZ.mp4
    01:12
  • 49 - Optional Reading Material for CPUZ.html
  • 50 - Metasploit Installation.mp4
    14:25
  • 51 - Very Important Course Update Metasploit Issue Resolved.html
  • 52 - 100 Working Metasploit Framework.html
  • 53 - Optional Reading Material for Installing the Metasploit in Termux.html
  • 54 - alert for Database Server.mp4
    00:28
  • 55 - Test the Metasploit Framework and learn what is MSFconsole.mp4
    04:20
  • 56 - Help Command and Banner Command.mp4
    01:44
  • 57 - Show Command no audio.mp4
    03:36
  • 58 - Show Search Info Use commands.mp4
    04:22
  • 59 - Metasploit exploit over the LAN explaination.mp4
    01:18
  • 60 - Reading Material of what is LAN ie LOCAL AREA NETWORK.html
  • 61 - complete exploit over the LAN.mp4
    17:07
  • 62 - Reading Material What is WAN ie WIDE AREA NETWORK.html
  • 63 - Port Forwarding Demonstration with Data is Turned on along with hotspot failed.mp4
    11:45
  • 64 - Hotspot Failure turning OFF again and again.mp4
    08:05
  • 65 - Getting confused with the LPORT while we are doing with WIFI.mp4
    17:14
  • 66 - learning from our mistakes perfectly working this time with wifi no audio.mp4
    07:14
  • 67 - Making our payload PERSISTENT.mp4
    20:07
  • 68 - What is encryption and decryption.mp4
    02:04
  • 69 - Reading Material Difference between Encryption and Decryption.html
  • 70 - Tool1.mp4
    05:16
  • 71 - OPTIONAL Reading Material The Rijndael Encryption Algorithm.html
  • 72 - Tool2.mp4
    06:09
  • 73 - OPTIONAL Reading Material pkzip stream cipher algorithm.html
  • 74 - Tool3 and what is salt explained.mp4
    06:46
  • 75 - Tool3 Continued decryption.mp4
    02:29
  • 76 - OPTIONAL Reading Material AES Algorithm.html
  • 77 - Section Introduction.mp4
    03:04
  • 78 - What is Phishing Attack.mp4
    02:35
  • 79 - Mirroring Website.mp4
    08:36
  • 80 - Installing PHP and starting the Server in localhost with port number.mp4
    05:54
  • 81 - Generated the password in localhost.mp4
    13:21
  • 82 - Uploading files in webhosting platform.mp4
    09:25
  • 83 - Convert your website to an Android APP.mp4
    08:38
  • 84 - Know the Tool which attackers use to access the Camera.mp4
    02:24
  • 85 - OPTIONAL READING Material.html
  • 86 - if SAYCHEESE is not cloning try this one.html
  • 87 - How to perform the attack.mp4
    09:50
  • 88 - How to uninstall the Tool.mp4
    02:09
  • 89 - 1 what is Tool Name and its Cloning from GitHub.mp4
    04:44
  • 90 - 2 changing the TOOL to full executable mode.mp4
    02:30
  • 91 - Attempt with Option 1 and its a Success.mp4
    11:23
  • 92 - Attempt with Option 2 and its again a Success.mp4
    11:07
  • 93 - Crack wifi password with rooted android device.mp4
    15:38
  • 94 - Learn how to install Kali Linux in non rooted android device.mp4
    09:11
  • 95 - Complete WebApplication Penetration Testing Practical CWAPT LIVE.html
  • 96 - Learn Augmented Reality 101 In Depth.html
  • 97 - Whats Next.html
  • Description


    100% Hands-On Real World Practical Approach on Android Ethical Hacking. Learn to Prevent FACEBOOK , INSTAGRAM hacking!

    What You'll Learn?


    • Transfom your Android Device into an Advance Ethical Hacking Machine
    • Instagram Hacking like pro ATTACKER and make people people aware of such an attack
    • Facebook Hacking like pro ATTACKER and make people people aware of such an attack
    • Any Social Media Hacking as PRO Attacker and make people people aware of such an attack
    • Metasploit Framework
    • Learn how to Use Termux from Scratch
    • PORT Forwarding
    • Clone any Website
    • What is Shell ?
    • BASH Scripting
    • What is F-Droid and its Importance
    • Package Management
    • Learn various CLI commands and use it like a Pro Penetration Tester
    • LAN Attack
    • WAN Attack
    • Learn how to make Persistent Payload
    • Cyber Security Terminology
    • Metasploit Architecture
    • Phishing Attack
    • Run Kali Linux in your Android Device without Root
    • Vulnerability , Exploit , Payload
    • Bind Shell and Reverse Shell
    • PHP Programming
    • Ways to Prevent Cyber Attacks
    • 3 Essential Tools of Encryption and Decryption
    • Learn Encryption and Decryption
    • How to access the Front Camera of the Victim
    • Protect Your files with Passwords
    • Installing PHP and Starting the Server
    • Convert your Phishing Website into an Android App
    • Wifi Password Cracking
    • using of Hackers KeyBoard
    • Social Engineering
    • What is SALT in Cryptography ?

    Who is this for?


  • Mobile Hacking
  • Beginners who want to Learn Cyber Security
  • Android Hacking
  • Beginners who are curious about Ethical Hacking
  • Beginner BASH Scripting
  • Learn Phishing Attack
  • PHP Programmers who wants to learn Ethical Hacking
  • Learn Social Engineering and help others by sharing your knowledge and making them aware
  • Metasploit Framework
  • Learning Cryptography
  • What You Need to Know?


  • Android Device
  • Internet
  • No Computer
  • No Laptop
  • Ethical Hacking Mindset
  • zeal to learn
  • Share your learning to your family , friends and everyone you know by making them aware about the cyber Attacks
  • No Illegal Activities
  • More details


    Description

    Course Update: Metasploit Issue Resolved!

    Hello Everyone,

    Welcome to the CAEHP, which stands for the Complete Android Ethical Hacking Practical Course.

    I'm Debayan Dey, your instructor for this exciting course. CAEHP is all about hands-on practical learning in the world of Android Ethical Hacking!

    This course is designed for anyone interested in understanding how attackers operate and extract information from their victims. What makes CAEHP unique is that you don't need a laptop or computer for this journey. All you need is an Android device because this course is 100% practical!

    Isn't that amazing?

    Plus, you don't even need to root your Android device. Yes, you read that right! All you need is your Android phone, and you can transform it into a powerful ethical hacking machine.

    A little about me: I hold certifications like Certified Secure Computer User (CSCU) v2, Certified Ethical Hacker (CEH V10) from EC COUNCIL, and Google IT support certification from Google. Currently, I'm pursuing a micromaster in Cyber Security from the Rochester Institute of Technology (RIT) in New York through edx. I've also completed courses from prestigious institutions like New York University and The State University of New York.

    Now, let's dive into what you can expect from the CAEHP COURSE.

    Firstly, this course doesn't have a time limit. As you progress, you'll find that new sections and videos are added regularly. This ensures you stay up-to-date with the latest features, attacks, and how to protect yourself.

    Currently, CAEHP has 6 Sections, 1 Optional Section, and 1 Bonus Section:

    SECTION 1: Meet and Greet

    • Introduction to the Section

    • What is Termux?

    • What is Shell?

    • Why Termux?

    • Installation

    • What is F-Droid?

    • Package Management

    • Q/A Session with the instructor and Social Media contacts

    SECTION 2: Termux Basics

    • Installing TERMUX from Google Play Store

    • Storage Setup, Update, and Upgrade

    • Why we use apt

    • Hidden files, versions

    • Various Text Editors

    • Learning how to check IP

    • Various other Network-Related Commands

    • Learning how to use GIT Repository

    • And much more!

    SECTION 3: Metasploit Framework

    • Payload creation

    • LAN and WAN attacks

    • Port forwarding

    • Creating persistent Payload

    • BASH Scripting

    • Gaining control of a victim's mobile device

    • And much more!

    SECTION 4: Encryption and Decryption

    • What is Encryption

    • What is Decryption

    • File encryption and decryption

    • Protecting files and folders with passwords

    • Installing important encryption tools in Linux

    • Understanding SALT in Cryptography

    • Performing Encryption and Decryption

    • And much more!

    SECTION 5: Phishing Attack

    • Introduction

    • What is a Phishing Attack?

    • Mirroring websites

    • Cloning social media sites like Facebook, Instagram, and Twitter

    • Learning PHP

    • Running a cloned website on your LocalHost

    • Uploading the files online

    • Running the cloned website online

    • Social Engineering techniques

    • And much more!

    SECTION 6: Camera Access and Uninstallation

    • Port forwarding

    • Generating HTTP or HTTPS URL links

    • Gaining camera access through a link

    • Receiving victim's photographs

    • Uninstalling dangerous packages

    • Staying safe and preventing hacking

    • Teaching family and friends how to stay protected

    OPTIONAL SECTION: For Rooted Android Devices

    • Understanding Wi-Fi networks

    • Learning about AIRCRACK-NG

    • Installation of the package

    • Using AIRMON-NG

    • And much more for rooted devices!

    BONUS SECTION: Running Kali Linux on Android

    • No need to root your Android device

    • Installing Kali Linux

    • Using SSH Client

    • Transforming your Android Device into a Penetration Testing and Ethical Hacking Device

    Each section includes quizzes, assignments, and reading materials. We will regularly update the course with new content, ensuring you stay ahead of the latest attack techniques and defenses.

    Please remember, this course is for educational and awareness purposes only. We demonstrate attacks so you can understand the technology and art behind them and protect yourself from social engineering. We do not condone or support any illegal activities.

    Feel free to reach out anytime; I'm here to help. If you encounter any problems, post your doubts, and you'll receive a response within 24 to 48 hours.

    Are you excited to embark on this 100% practical course, learn valuable skills, and help your family stay secure from data theft and hackers?

    Best of luck, and I'll see you on the course landing page!

    Who this course is for:

    • Mobile Hacking
    • Beginners who want to Learn Cyber Security
    • Android Hacking
    • Beginners who are curious about Ethical Hacking
    • Beginner BASH Scripting
    • Learn Phishing Attack
    • PHP Programmers who wants to learn Ethical Hacking
    • Learn Social Engineering and help others by sharing your knowledge and making them aware
    • Metasploit Framework
    • Learning Cryptography

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Hey everyone! I'm Debayan Dey, and I'm thrilled to be part of the Udemy instructor community, where I can channel my enthusiasm for creating engaging e-learning content. With over three years of experience in supporting learners, I'm dedicated to providing you with accurate information and guiding you on your educational journey.My expertise lies in IT support, Unity 3D and software development, where I've honed my skills in developing captivating 2D, 3D, and multiplayer games, as well as cutting-edge Augmented Reality Apps. Alongside my passion for e-learning, I hold certifications as a Google IT Support Engineer, CEH v10, CSCU v2, and DJI Drone Pilot. Photography is another outlet for my creative spirit, and you can find glimpses of my adventures on my Instagram travel blog, "thenewagetraveller." Additionally, I'm excited to share my insights and experiences through my dynamic YouTube channel (link shared in my bio).Supporting a community of 200,000+ students from 100+ countries has been an incredibly rewarding experience. Your enthusiasm fuels my dedication to provide top-notch teaching guidance. I'm here to answer your questions and assist you every step of the way. Let's embark on this learning adventure together, as I'm committed to helping you unlock your true potential.Stay tuned for exciting new courses on programming, online marketing, designing, hacking, and more. I'm eager to share my knowledge with you and empower you with valuable skills. Get ready to dive in and discover the world of possibilities that awaits.Remember, my passion for e-learning and supporting learners drives me forward. Together, let's embrace the joy of learning and achieve great things!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 71
    • duration 5:37:10
    • English subtitles has
    • Release Date 2024/03/19

    Courses related to Ethical Hacking