Tutorialspoint

#May Motivation Use code MAY10 for extra 10% off

The Complete Android Ethical Hacking Practical Course (CAEHP)

person icon DEBAYAN DEY

4.5

The Complete Android Ethical Hacking Practical Course (CAEHP)

Master Android Ethical Hacking with a 100% real-world practical approach. Learn how to Prevent Facebook, Instagram, and other social media channels from hacking!

updated on icon Updated on May, 2024

language icon Language - English

person icon DEBAYAN DEY

English [CC]

category icon IT & Software,Network & Security,Ethical Hacking

Lectures -75

Resources -1

Duration -5 hours

4.5

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

Complete Android Ethical Hacking Practical Course is designed for anyone who is interested in learning how an attacker attack and get information from the victim. 

The CAEHP was created with the understanding that the majority of us do not regularly use laptops or other computers for work. Because of this, you are not required to have a laptop or computer system for this course. All you need is an Android device for this 100% practical course. And, the most important thing, you need not root your Android device. 

I am Debayan Dey, a Certified Secure Computer User (CSCU) v2 and Certified Ethical Hacker (CEH V10) from the EC Council.

I am also a certified Google IT support from Google and currently doing a micro master in the Field of Cyber Security from Rochester Institute of Technology (RIT) New York in edX. 

here are a few of my other accomplishments in the field of cyber security, 

  • Introduction to Cyber Attacks, New York University 

  •  introduction to Cyber Security for Business, University of Colorado System

  •  Palo Alto Networks academy cybersecurity foundation, Palo alto networks 

  • International cyber conflicts, The State University of New York 

  •  Cyber Attacks Countermeasures, New York University 

  •  Networking and Security Architecture with Vmware NSX 

  •  Enterprise System Management and Security, University of Colorado System 

Rest we'll have a meet and greet section to know other Learners ...!!!

The Complete Android Ethical Hacking Practical Course Overview

First of all, you should know that this course is not limited to time.

You may see 6 or 7 sections right now, but as you progress through the course over the next few weeks, you'll notice that more sections and videos have been added. The benefit of completing this course is that you'll receive regular updates on new features and attacks as well as information on how you can defend yourself against them.

so currently in the CAEHP course, we have 6 Sections + 1 Optional Section and 1 Bonus Section

Section 1: 

  • Meet and Greet

  • Introduction of the Section

  • What is Termux?

  • What is Shell?

  • Why Termux?

  • Installation 

  • What is F-Droid?

  • Package Management 

  • Q/A Session with an instructor and various Social Media availability

So, we'll turn our Android device into a completely ethical hacking powerful device by installing Termux. 

Section 2: 

  • Next, we'll cover, Termux basics by learning various CLI commands.

  • Installing Termux from the Google Play Store

  • Storage Setup, Update, and Upgrade 

  • Learn why we use apt

  • hidden files, versions

  • Various Text Editor

  • Learn how to check IP 

  • Various other Network Related Commands

  • Learn why we change various modes 

  • Learn how to use GIT Repository

  • and much more cool stuff...!!!!

Section 3: 

  • There we'll cover one of the most powerful tools in penetration testing and ethical hacking, i.e. Metasploit Framework.

  • We'll see how an attacker creates payloads 

  •  perform LAN and WAN i.e. local area network and wide area network attacks 

  • using port forwarding 

  • and how the attacker creates persistent Payload 

  • Learn BASH Scripting

  • and how an attacker takes control of the victim's mobile device and gets all the data.

  • and much more cool stuff...!!!

Section 4: 

  • Next, we'll learn what is Encryption

  • what is Decryption 

  •  how we can encrypt our files

  • how we can Decrypt our files

  •  Learn how we can protect our files and folders with passwords 

  •  so in this section, we'll cover the installation of 3 very important tools used for Encryption and Decryption in Linux 

  • What is SALT in Cyprography?

  • Further, we'll learn how we can perform Encryption and Decryption

  • and much more cool stuff...!!!

Section 5: 

  • Most exciting Section 

  • Introduction

  • What is a Phishing Attack?

  • We are going to learn how an attacker does phishing attacks. 

  • here we'll mirror any website 

  • We'll also learn how we can clone Facebook, Instagram, Twitter, or any social media 

  •  installation of PHP

  •  starting of the PHP server

  • Run the Cloned Website in your LocalHost

  • Then upload the files online

  • Run the Cloned Website Online

  • Learn Social Engineering 

  • Share the link with the Victim and get the Username and the Password once the Victim tries to log in

  • Creating an app for the cloned website

  • Share the Android App with the victim

  • Again learn how to do Social Engineering so that the Victim downloads the App

  • Get the Username and the Password once the Victim tries to log in from the APP

  • So in this section, we'll see how an attacker sends a link or an app to the victim and once the victim tries to log in with login credentials, bang, the victim's password is with the attacker. 

  • and much more cool stuff...!!!!

Section 6: 

  • The next section is pretty interesting 

  • we'll see how we can do port forwarding

  • generate an HTTP or HTTPS URL Link

  • how by simply sending a link an attacker gets complete camera access 

  • and receives the photographs after every few intervals of time of the victim.

  • Next, we'll see how to Uninstall such a Dangerous Package

  • We will learn how to stay safe

  • Prevent from getting Hacked 

  • Learn how to be aware of your Family Members and known people by teaching them how to stay protected

  • and much more cool stuff...!!!!

Bonus Section: 

  • And, last but not least we have a bonus section.

  • We'll see how we'll run Kali Linux on our Android device 

  • No need to Root your Android Device

  • Apps to install 

  • Installation of Kali Linux 

  • Learn using SSH Client 

  • Turn your Android Device into a Penetration Testing and Ethical Hacking Device

  • and much more cool stuff to be added up...!!!!

So all the sections will cover Quizzes, Assignments, and Reading Materials.

If you join in the course, you'll undoubtedly understand different strategies of how attackers attack and how we may protect ourselves from being attacked. Also, all the sections will be updated on a regular basis, and new sections will also be introduced.

  • Most importantly, this course is completely for educational purposes

  • All the attacks that an attacker performs are demonstrated to you so that you understand the technology and the art behind it and you're not fooled by any kind of social engineering.

  • This course is for educational and awareness purposes, to make everyone aware and be safe and protect your data.

  •  It is a request that, please do not perform any illegal activities, Tutorialspoint and I ( Debayan Dey ) are not responsible for the illegal activities you perform.

Goals

What will you learn in this course:

  • Transform your Android Device into an Advance Ethical Hacking Machine

  • Any Social Media Hacking as PRO Attacker and make people aware of such an attack

  • Metasploit Framework

  • Learn how to Use Termux from Scratch

  • PORT Forwarding

  • Clone any Website

  • What is Shell?

  • BASH Scripting

  • What is F-Droid and its Importance

  • Package Management

  • Learn various CLI commands and use it like a Pro Penetration Tester

  • LAN Attack

  • WAN Attack

  • Learn how to make a Persistent Payload

  • Cyber Security Terminology

  • Metasploit Architecture

  • Phishing Attack

  • Run Kali Linux on your Android Device without Root

  • Vulnerability, Exploit, Payload

  • Bind Shell and Reverse Shell

  • PHP Programming Basics

  • Ways to Prevent Cyber Attacks

  • 3 Essential Tools of Encryption and Decryption

  • Learn Encryption and Decryption

  • How to access the Front Camera of the Victim

  • Protect Your files with Passwords

  • Installing PHP and Starting the Server

  • Convert your Phishing Website into an Android App

  • using of Hackers Keyboard

  • Social Engineering

  • What is SALT in Cryptography?

Prerequisites

What are the prerequisites for this course?

  • Android Device

  • Internet

  • No Computer

  • No Laptop

  • Ethical Hacking Mindset

  • zeal to learn

  • Share your learning with your family, friends, and everyone you know by making them aware of the cyber Attacks

  • No Illegal Activities

The Complete Android Ethical Hacking Practical Course (CAEHP)

Curriculum

Check out the detailed breakdown of what’s inside the course

Section 1 - Introduction
11 Lectures
  • play icon Course Preview 05:54 05:54
  • play icon Section Introduction 01:03 01:03
  • play icon What is Termux ? 02:51 02:51
  • play icon What is shell 01:02 01:02
  • play icon Why Termux ? 01:59 01:59
  • play icon Installation 00:49 00:49
  • play icon What is FDroid ? 01:05 01:05
  • play icon Package Management 01:23 01:23
  • play icon Meet AND Greet !
  • play icon Importance of Ethical Hacking?
  • play icon Entire Course Reading Material
Termux Basics
21 Lectures
Tutorialspoint
Metasploit Framework
23 Lectures
Tutorialspoint
Protect your files with Encryption
5 Lectures
Tutorialspoint
Phishing Attack and how to Prevent Unknown Threats
6 Lectures
Tutorialspoint
How an attacker access your Front Camera
3 Lectures
Tutorialspoint
Access Front Camera and Back Camera of your Victims Android Device 100% Working
4 Lectures
Tutorialspoint
Reward Section
1 Lectures
Tutorialspoint

Instructor Details

DEBAYAN DEY

DEBAYAN DEY

e


Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515