Udemy

Platform

English

Language

Network & Security

Category

The Complete Android Ethical Hacking Practical Course C|AEHP

100% Hands-On Real World Practical Approach on Android Ethical Hacking. Learn to Prevent FACEBOOK , INSTAGRAM hacking!

4.19 (1522 reviews)

124008

Students

6 hours

Content

Jan 2021

Last Update
$124.99
Regular Price


What you will learn

Transfom your Android Device into an Advance Ethical Hacking Machine

Instagram Hacking like pro ATTACKER and make people people aware of such an attack

Facebook Hacking like pro ATTACKER and make people people aware of such an attack

Any Social Media Hacking as PRO Attacker and make people people aware of such an attack

Metasploit Framework

Learn how to Use Termux from Scratch

PORT Forwarding

Clone any Website

What is Shell ?

BASH Scripting

What is F-Droid and its Importance

Package Management

Learn various CLI commands and use it like a Pro Penetration Tester

LAN Attack

WAN Attack

Learn how to make Persistent Payload

Cyber Security Terminology

Metasploit Architecture

Phishing Attack

Run Kali Linux in your Android Device without Root

Vulnerability , Exploit , Payload

Bind Shell and Reverse Shell

PHP Programming

Ways to Prevent Cyber Attacks

3 Essential Tools of Encryption and Decryption

Learn Encryption and Decryption

How to access the Front Camera of the Victim

Protect Your files with Passwords

Installing PHP and Starting the Server

Convert your Phishing Website into an Android App

Wifi Password Cracking

using of Hackers KeyBoard

Social Engineering

What is SALT in Cryptography ?


Description


New Annoucement : Course Update for September Month

Hello Everyone !

Welcome to the CAEHP i.e. the Complete Android Ethical Hacking Practical Course .

My name is DEBAYAN DEY and i will be your Instructor for the CAEHP Course.

CAEHP is one of the Most Comprehensive Real World  100%  Hands-On Practical Approach on Android Ethical Hacking...!!!

Now this course is designed for anyone who is interested in learning how an attacker attack and get the information from the victim.

CAEHP is designed by keeping in mind that most of us are not having laptops or computer machine to work for most of the time.  Thats why in this course curriculum , you need not require any laptop or computer system.

Only you need an android device and this entire course is 100% practical based !

isn't this amazing ???

Yess , plus the most important thing , you need not to root your Android device.

waaoo !!! so all in one ,  you just require an android phone and turn it into powerful ethical hacking machine.

Lil brief about my name ,   i am Certified Secure Computer User (CSCU) v2 , and Certified Ethical Hacker (CEH V10) from EC COUNCIL

also i am certified Google IT support from Google , and currently doing  micromaster  in the Field of Cyber Security from Rochester institute of technology (RIT) New York in edx .

here are few of my other accomplishments in the field of cyber security ,

  • Introduction to Cyber Attacks , New York University

  • introduction to Cyber security for business , University of Colorado System

  • Palo Alto Networks academy cybersecurity foundation  , Palo alto networks

  • International cyber conflicts  , The State University of New York

  • Cyber Attacks Countermeasures , New York University

  • Networking ans security Architecture with Vmware NSX

  • Enterprise System Management and security ,University of Colorado System

Rest we'll have a meet and greet section to know other Learners ...!!!

so whats there in this CAEHP COURSE?

First of all i would love to  tell you , that this course is not limited  to time .

You may see 6 or 7 section today , once you land in this course after few weeks , you'll see more sections and videos are added up.  so this is the advantage of taking this course that you'll get regular updates about the new features and attacks and how you , as an individual can prevent yourself  from such an attack.


so currently in CAEHP course  , we have 6 Section + 1 Optional Section and 1 Bonus Section


SECTION  1  :

  • Meet and Greet

  • Introduction of the Section

  • What is Termux ?

  • What is Shell ?

  • Why Termux ?

  • Installation

  • What is F-Droid ?

  • Package Management

  • Q/A Session with instructor  and  various Social Media availability

So , we'll turn our Android device to a complete ethical hacking powerful device by installing termux.


SECTION  2  :

  • Next we'll cover , termux basics by learning various CLI commands.

  • Installing TERMUX from Google Play Store

  • Storage Setup , Update and Upgrade

  • Learn why we use apt

  • hidden files , versions

  • Various Text Editor

  • Learn how to check IP

  • Various other Network Related Commands

  • Learn why we change various modes

  • Learn how to use GIT Repository

  • and much more cool stuffs...!!!!


SECTION  3  :

  • There after we'll cover one of the most powerful tool in penetration testing and ethical hacking , i.e. Metasploit Framework.

  • We'll see  how an attacker create payloads

  • perform LAN   and WAN i.e local area  network and wide area network attacks

  • using port forwarding

  • and how the attacker creates persistent Payload

  • Learn BASH Scripting

  • and how an attackers takes the control of the victims mobile device and get all the data.

  • and much more cool stuffs...!!!

SECTION  4  :

  • next we'll learn what is Encryption

  • what is Decryption

  • how we can encrypt our files

  • how we can Decrypt our files

  • Learn how we can protect our files and folders with passwords

  • so in this section we'll cover installation of 3 very important tools used for Encryption and Decryption in Linux

  • What is SALT in Cyprography ?

  • Further we'll learn how we can perform Encryption and Decryption

  • and much more cool stuffs...!!!

SECTION  5  :

  • most exciting Section

  • Introduction

  • What is Phishing Attack ?

  • We gonna learn  how an attacker do phishing attacks.

  • here we'll mirror any website

  •   We'll also learn how we can clone Facebook , Instagram , twitter or any social media

  • installation of PHP

  • starting of PHP server 

  • Run the Cloned Website in your LocalHost

  • Then uploading  the files online

  • Run the Cloned Website Online

  • Learn Social Engineering

  • Share the link to the Victim and get the Username and the Password once the Victim tries to Login

  • and then creating an app of the cloned website

  • Share the Android App with the victim

  • Again learn how to do Social Engineering so that the Victim downloads the App

  • Get the Username and the Password once the Victim tries to Login from the APP

  • So in this section , we'll see how an attacker sends a link or an app to the victim and once the victim tries to login with login credentials , bang , victims password is with the attacker .

  • and much more cool stuffs...!!!!


SECTION  6  :

  • next section is pretty much interesting

  • we'll see how we can do port forwarding

  • generate an HTTP or HTTPS  url Link

  • how by simply sending a link  an attacker gets complete camera access

  • and receives the photographs after every few interval of time of the victim.

  • Next we'll see how to Uninstall such Dangerous Package

  • We will learn how to stay safe

  • Prevent from getting Hacked

  • Learn how to Aware your Family Members and known person by teaching them how to stay protected

  • and much more cool stuffs...!!!!


OPTIONAL SECTION  :

  • this section named as optioal section , we gonna cover various tools which can be very handy for the rooted android device.

  • Ok so those who are having rooted android device can go through this section.

  • Learn working of  Wifi Network

  • Learn what is AIRCRACK-NG

  • Installation of the package

  • Learn how to use AIRMON-NG

  • and much more cool stuffs to be added up...!!!!


REWARD ( BONUS) SECTION  :

  • and last but not the least  we have bonus section.

  • We'll see how we'll  run kali Linux in our Android device

  • No need to Root your Android Device

  • Apps to install

  • Installation of Kali Linux

  • Learn using SSH Client

  • Turn your Android Device into a Penetration Testing and Ethical Hacking Device

  • and much more cool stuffs to be added up...!!!!


So all the sections will cover Quizzes , Assignments and Reading Materials .

Also , all the sections will be updated on regular basis and new sections will also be added up , so once you are enrolled in the course , you'll surely gonna learn various techniques how attackers attack and how we can safe ourselves from getting attacked.


  • Most importantly , this course is completely for educational purpose


  • all the attacks which an attacker perform  are demonstrated to you so that you understand the technology and the art behind it and you're not fooled by any kind of social engineering.


  • This course is for educational and awareness purpose , to make everyone aware and be safe and protect your data.


  • Its a request , please do not perform any illegal activities , Udemy and me ( Debayan Dey ) is not responsible for  your illegal activities you perform.


so, Welcome to the world of  complete android Ethical hacking  practical course.


Feel Free to Reach out at any point of time , i will be happy to Help you , and if you face any PROBLEM , just post your DOUBTS , you will be Answered within 24hrs to 48hrs of time ..!!!!!


ARE YOU EXCITED to learn 100% complete practical course  and help your family stay secured and safe from data theft and from hackers ?

Wish you all the best...!!!!

See you in the course landing page ....!!!!


Screenshots

The Complete Android Ethical Hacking Practical Course C|AEHP
The Complete Android Ethical Hacking Practical Course C|AEHP
The Complete Android Ethical Hacking Practical Course C|AEHP
The Complete Android Ethical Hacking Practical Course C|AEHP

Content

Introduction

Disclaimer and Note

5 Mins Reading Material Before we Start

Self Test

Introduction

What is Termux ?

What is Shell ?

Why Termux ?

Installation

what is F-Droid ?

Package Management

Q/A Session with instructor and various Social Media availability

Termux Basics

Installing TERMUX from Google Play Store

Storage Setup , Update and Upgrade Command

Why we use apt ?

apt Command in Linux

Remove Package

You can also download Hackers Keyboard from Google Play Store

Package Management Basics: apt, yum, dnf, pkg

Optional Reading Material for Knowledge : Package Management Systems

Optional Reading Material : Update Package Lists

apt-show

hidden files , versions and CD commands

Nano and Cat commands

PWD and touch command

mkdir command

use of cd command

use of mv command

use of rm command

mix use of " cp , mv and touch " command

use of uname command

use of ifconfig command

know your IP address

use of Ping command

use of "chmod" command

use of cal and proc command

use of git clone and wget command

Various Other Useful Commands

Advanced Termux/Linux Commands Learning in the form of Quiz for Knowledge

Metasploit Framework

What is Penetration Testing ?

Optional Advanced Understanding of Penetration Testing and its Stages

Advanced Penetration Testing Questions to give you indepth knowledge

What is Metasploit Framework and its History

Optional Reading Material for Metasploit Framework

Basic Terminologies " Vulnerability"

Basic Terminologies " Exploit"

Basic Terminologies " Payload"

basic architecture of Metasploit

Module in Architecture of Metasploit

What is Shell , Bind Shell , Reverse Shell

Initial Steps , ways to Prevent these Attacks and Conclusion

READING Material "What is Social Engineering ? "

Social Engineering

installation of CPU-Z

Optional Reading Material for CPU-Z

Metasploit Installation

Optional Reading Material for Installing the Metasploit in Termux

alert for Database Server

Test the Metasploit Framework and learn what is MSFconsole

Help Command and Banner Command

Show Command ( no audio )

Show , Search Info , Use commands

Metasploit exploit over the LAN explaination

Reading Material of what is LAN i.e. LOCAL AREA NETWORK

complete exploit over the LAN

Reading Material " What is WAN i.e. WIDE AREA NETWORK ? "

Port Forwarding Demonstration with Data is Turned on along with hotspot (failed)

Hotspot Failure ( turning OFF again and again )

Getting confused with the LPORT while we are doing with WIFI

learning from our mistakes perfectly working this time with wifi ( no audio)

Making our payload PERSISTENT

Metasploit Quiz

Protect your files with Encryption

What is encryption and decryption

Reading Material " Difference between Encryption and Decryption"

Tool1

OPTIONAL Reading Material "The Rijndael Encryption Algorithm"

Tool2

OPTIONAL Reading Material "pkzip stream cipher algorithm"

Tool3 and what is "salt" explained

Tool3 Continued "decryption"

OPTIONAL Reading Material "AES Algorithm"

Phishing Attack and how to Prevent Unknown Threats

Section Introduction

What is Phishing Attack ?

Mirroring Website

Installing PHP and starting the Server in localhost with port number

Generated the password in localhost

Uploading files in webhosting platform

Convert your website to an Android APP

Advanced Phishing Attack Questions

How an attacker access your Front Camera

Know the Tool which attackers use to access the Camera

OPTIONAL READING Material

How to perform the attack

How to uninstall the Tool

Optional Section

Crack wifi password with rooted android device

Reward Section

Learn how to install Kali Linux in non rooted android device



Reviews

A
Ayush25 November 2020

It is a wonderful course for starting android hacking, It explained very well that even a person with no hacking knowledge could understand concepts better

S
Snazzy10 November 2020

So far so good. The instructor is knowledgeable about the topic and knows how to deliver it to the students.

B
Brijesh6 November 2020

Very good course you Will learn many nee things from this course if are a beginneror have some what knowlege about it.

M
Marc31 October 2020

I'm very satisfied regarding the course. However I thought we would approach more file injection instead of "victim's" collaboration. Nevertheless, I learned many things with your course so : Thank you sir !

M
Mukund22 October 2020

Amazing Course. Never knew this much about Hacking and this can surely help everyone to stay away from many possible attacks.

A
Abhinav9 October 2020

I loved this course, I was searching for this for a long time now I have it. The inatructor is amazing.

A
Anand21 September 2020

Hi , few of the course material was good but others like say cheese and wishfish are pretty old ones. You may need to add some latest ones. Otherwise , your course was decent enough. thanks

A
Anupama20 September 2020

It was good attending this course . meet my expectation. Encourage me to explore more on the topic. Also give me an idea about the vulnerabilities and how vigilant we should be.

H
Harish16 September 2020

Hey!!!Brother....really i learn many things and your the best in this course....hope for you with more upcoming courses.....Thankyou!!!!

K
Kammari15 September 2020

Literally Awesome. I would love to know more about this using kali linux on a PC rather than using an android device. THANK YOU!!

S
Sanjay13 September 2020

Good course. I enjoyed it and recommend for others to take it if you are a beginner and want to learn more. Satisfied with the instructor effort.

A
Ajith30 August 2020

This course is very good and interesting and i learned lot of things about ethical hacking using android device. This course is simple and easy to understand. Do more videos in this course like kali Linux hacking method using android. Course instructor was good at explaining the content. Do more videos like this. Thank you for this course.

N
Navid29 August 2020

please consider using another termux style with higher color contrast and bigger font size in your next tutorials. thanks for your effort creating this great course

D
Darshak28 August 2020

Amazing course, Every single thing is explained in full details. after learning these course we have the professional knowledge about how are are gone been victims and also in detail explained about how to be aware of it. Thanks its very good course

M
Mehar25 June 2020

I was not aware of such attacks which attackers perform with the help of only Mobile Device. Great initiative by the instructor by giving us proper knowledge and guidance in the field of cyber security in an ethical way . I especially the FRONT CAMERA access was very much important in this course , as we randomly " allow " permissions in most of the apps and websites. Thanks for the knowledge .



Coupons

StatusDateDiscount
Expired6/30/2020100% OFF
Expired7/26/2020100% OFF
Expired8/8/2020100% OFF
Expired8/14/2020100% OFF
Expired8/27/2020100% OFF
Expired9/2/202094% OFF
Expired9/27/2020100% OFF
Expired10/29/2020100% OFF
Expired12/18/2020100% OFF
Expired1/12/2021100% OFF
Expired1/25/2021100% OFF
Expired2/7/2021100% OFF
Expired2/23/2021100% OFF

3205941

Udemy ID

6/5/2020

Course created date

6/28/2020

Course Indexed date
Bot
Course Submitted by

Twitter
Telegram
Android PlayStore
Apple Appstore