The Complete Android Ethical Hacking Practical Course (CAEHP)
Master Android Ethical Hacking with a 100% real-world practical approach. Learn how to Prevent Facebook, Instagram, and other social media channels from hacking!
IT & Software,Network & Security,Ethical Hacking
Lectures -75
Resources -1
Duration -5 hours
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
Complete Android Ethical Hacking Practical Course is designed for anyone who is interested in learning how an attacker attack and get information from the victim.
The CAEHP was created with the understanding that the majority of us do not regularly use laptops or other computers for work. Because of this, you are not required to have a laptop or computer system for this course. All you need is an Android device for this 100% practical course. And, the most important thing, you need not root your Android device.
I am Debayan Dey, a Certified Secure Computer User (CSCU) v2 and Certified Ethical Hacker (CEH V10) from the EC Council.
I am also a certified Google IT support from Google and currently doing a micro master in the Field of Cyber Security from Rochester Institute of Technology (RIT) New York in edX.
here are a few of my other accomplishments in the field of cyber security,
Introduction to Cyber Attacks, New York University
introduction to Cyber Security for Business, University of Colorado System
Palo Alto Networks academy cybersecurity foundation, Palo alto networks
International cyber conflicts, The State University of New York
Cyber Attacks Countermeasures, New York University
Networking and Security Architecture with Vmware NSX
Enterprise System Management and Security, University of Colorado System
Rest we'll have a meet and greet section to know other Learners ...!!!
The Complete Android Ethical Hacking Practical Course Overview
First of all, you should know that this course is not limited to time.
You may see 6 or 7 sections right now, but as you progress through the course over the next few weeks, you'll notice that more sections and videos have been added. The benefit of completing this course is that you'll receive regular updates on new features and attacks as well as information on how you can defend yourself against them.
so currently in the CAEHP course, we have 6 Sections + 1 Optional Section and 1 Bonus Section
Section 1:
Meet and Greet
Introduction of the Section
What is Termux?
What is Shell?
Why Termux?
Installation
What is F-Droid?
Package Management
Q/A Session with an instructor and various Social Media availability
So, we'll turn our Android device into a completely ethical hacking powerful device by installing Termux.
Section 2:
Next, we'll cover, Termux basics by learning various CLI commands.
Installing Termux from the Google Play Store
Storage Setup, Update, and Upgrade
Learn why we use apt
hidden files, versions
Various Text Editor
Learn how to check IP
Various other Network Related Commands
Learn why we change various modes
Learn how to use GIT Repository
and much more cool stuff...!!!!
Section 3:
There we'll cover one of the most powerful tools in penetration testing and ethical hacking, i.e. Metasploit Framework.
We'll see how an attacker creates payloads
perform LAN and WAN i.e. local area network and wide area network attacks
using port forwarding
and how the attacker creates persistent Payload
Learn BASH Scripting
and how an attacker takes control of the victim's mobile device and gets all the data.
and much more cool stuff...!!!
Section 4:
Next, we'll learn what is Encryption
what is Decryption
how we can encrypt our files
how we can Decrypt our files
Learn how we can protect our files and folders with passwords
so in this section, we'll cover the installation of 3 very important tools used for Encryption and Decryption in Linux
What is SALT in Cyprography?
Further, we'll learn how we can perform Encryption and Decryption
and much more cool stuff...!!!
Section 5:
Most exciting Section
Introduction
What is a Phishing Attack?
We are going to learn how an attacker does phishing attacks.
here we'll mirror any website
We'll also learn how we can clone Facebook, Instagram, Twitter, or any social media
installation of PHP
starting of the PHP server
Run the Cloned Website in your LocalHost
Then upload the files online
Run the Cloned Website Online
Learn Social Engineering
Share the link with the Victim and get the Username and the Password once the Victim tries to log in
Creating an app for the cloned website
Share the Android App with the victim
Again learn how to do Social Engineering so that the Victim downloads the App
Get the Username and the Password once the Victim tries to log in from the APP
So in this section, we'll see how an attacker sends a link or an app to the victim and once the victim tries to log in with login credentials, bang, the victim's password is with the attacker.
and much more cool stuff...!!!!
Section 6:
The next section is pretty interesting
we'll see how we can do port forwarding
generate an HTTP or HTTPS URL Link
how by simply sending a link an attacker gets complete camera access
and receives the photographs after every few intervals of time of the victim.
Next, we'll see how to Uninstall such a Dangerous Package
We will learn how to stay safe
Prevent from getting Hacked
Learn how to be aware of your Family Members and known people by teaching them how to stay protected
and much more cool stuff...!!!!
Bonus Section:
And, last but not least we have a bonus section.
We'll see how we'll run Kali Linux on our Android device
No need to Root your Android Device
Apps to install
Installation of Kali Linux
Learn using SSH Client
Turn your Android Device into a Penetration Testing and Ethical Hacking Device
and much more cool stuff to be added up...!!!!
So all the sections will cover Quizzes, Assignments, and Reading Materials.
If you join in the course, you'll undoubtedly understand different strategies of how attackers attack and how we may protect ourselves from being attacked. Also, all the sections will be updated on a regular basis, and new sections will also be introduced.
Most importantly, this course is completely for educational purposes
All the attacks that an attacker performs are demonstrated to you so that you understand the technology and the art behind it and you're not fooled by any kind of social engineering.
This course is for educational and awareness purposes, to make everyone aware and be safe and protect your data.
It is a request that, please do not perform any illegal activities, Tutorialspoint and I ( Debayan Dey ) are not responsible for the illegal activities you perform.
Goals
What will you learn in this course:
Transform your Android Device into an Advance Ethical Hacking Machine
Any Social Media Hacking as PRO Attacker and make people aware of such an attack
Metasploit Framework
Learn how to Use Termux from Scratch
PORT Forwarding
Clone any Website
What is Shell?
BASH Scripting
What is F-Droid and its Importance
Package Management
Learn various CLI commands and use it like a Pro Penetration Tester
LAN Attack
WAN Attack
Learn how to make a Persistent Payload
Cyber Security Terminology
Metasploit Architecture
Phishing Attack
Run Kali Linux on your Android Device without Root
Vulnerability, Exploit, Payload
Bind Shell and Reverse Shell
PHP Programming Basics
Ways to Prevent Cyber Attacks
3 Essential Tools of Encryption and Decryption
Learn Encryption and Decryption
How to access the Front Camera of the Victim
Protect Your files with Passwords
Installing PHP and Starting the Server
Convert your Phishing Website into an Android App
using of Hackers Keyboard
Social Engineering
What is SALT in Cryptography?
Prerequisites
What are the prerequisites for this course?
Android Device
Internet
No Computer
No Laptop
Ethical Hacking Mindset
zeal to learn
Share your learning with your family, friends, and everyone you know by making them aware of the cyber Attacks
No Illegal Activities
Curriculum
Check out the detailed breakdown of what’s inside the course
Section 1 - Introduction
11 Lectures
- Course Preview 05:54 05:54
- Section Introduction 01:03 01:03
- What is Termux ? 02:51 02:51
- What is shell 01:02 01:02
- Why Termux ? 01:59 01:59
- Installation 00:49 00:49
- What is FDroid ? 01:05 01:05
- Package Management 01:23 01:23
- Meet AND Greet !
- Importance of Ethical Hacking?
- Entire Course Reading Material
Termux Basics
21 Lectures
Metasploit Framework
23 Lectures
Protect your files with Encryption
5 Lectures
Phishing Attack and how to Prevent Unknown Threats
6 Lectures
How an attacker access your Front Camera
3 Lectures
Access Front Camera and Back Camera of your Victims Android Device 100% Working
4 Lectures
Reward Section
1 Lectures
Instructor Details
DEBAYAN DEY
eCourse Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now