17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
Requirements Android Device Internet No Computer No Laptop Ethical Hacking Mindset zeal to learn Share your learning to your family , friends and everyone you know by making them aware about the cyber Attacks No Illegal Activities Description Use this coupon code to get the best Deal
✨ Use the COUPON CODE : SEPTEMBER ✨
New Annoucement : Course Update for August Month
Hello Everyone !
Welcome to the CAEHP i.e. the Complete Android Ethical Hacking Practical Course .
My name is DEBAYAN DEY and i will be your Instructor for the CAEHP Course.
CAEHP is one of the Most Comprehensive Real World 100% Hands-On Practical Approach on Android Ethical Hacking...!!!
Now this course is designed for anyone who is interested in learning how an attacker attack and get the information from the victim.
CAEHP is designed by keeping in mind that most of us are not having laptops or computer machine to work for most of the time. Thats why in this course curriculum , you need not require any laptop or computer system.
Only you need an android device and this entire course is 100% practical based !
isn't this amazing ???
Yess , plus the most important thing , you need not to root your Android device.
waaoo !!! so all in one , you just require an android phone and turn it into powerful ethical hacking machine.
Lil brief about my name , i am Certified Secure Computer User (CSCU) v2 , and Certified Ethical Hacker (CEH V10) from EC COUNCIL
also i am certified Google IT support from Google , and currently doing micromaster in the Field of Cyber Security from Rochester institute of technology (RIT) New York in edx .
here are few of my other accomplishments in the field of cyber security ,
Introduction to Cyber Attacks , New York University
introduction to Cyber security for business , University of Colorado System
Palo Alto Networks academy cybersecurity foundation , Palo alto networks
International cyber conflicts , The State University of New York
Cyber Attacks Countermeasures , New York University
Networking ans security Architecture with Vmware NSX
Enterprise System Management and security ,University of Colorado System
Rest we'll have a meet and greet section to know other Learners ...!!!
so whats there in this CAEHP COURSE?
First of all i would love to tell you , that this course is not limited to time .
You may see 6 or 7 section today , once you land in this course after few weeks , you'll see more sections and videos are added up. so this is the advantage of taking this course that you'll get regular updates about the new features and attacks and how you , as an individual can prevent yourself from such an attack.
so currently in CAEHP course , we have 6 Section + 1 Optional Section and 1 Bonus Section
SECTION 1 :
Meet and Greet
Introduction of the Section
What is Termux ?
What is Shell ?
Why Termux ?
Installation
What is F-Droid ?
Package Management
Q/A Session with instructor and various Social Media availability
So , we'll turn our Android device to a complete ethical hacking powerful device by installing termux.
SECTION 2 :
Next we'll cover , termux basics by learning various CLI commands.
Installing TERMUX from Google Play Store
Storage Setup , Update and Upgrade
Learn why we use apt
hidden files , versions
Various Text Editor
Learn how to check IP
Various other Network Related Commands
Learn why we change various modes
Learn how to use GIT Repository
and much more cool stuffs...!!!!
SECTION 3 :
There after we'll cover one of the most powerful tool in penetration testing and ethical hacking , i.e. Metasploit Framework.
We'll see how an attacker create payloads
perform LAN and WAN i.e local area network and wide area network attacks
using port forwarding
and how the attacker creates persistent Payload
Learn BASH Scripting
and how an attackers takes the control of the victims mobile device and get all the data.
and much more cool stuffs...!!!
SECTION 4 :
next we'll learn what is Encryption
what is Decryption
how we can encrypt our files
how we can Decrypt our files
Learn how we can protect our files and folders with passwords
so in this section we'll cover installation of 3 very important tools used for Encryption and Decryption in Linux
What is SALT in Cyprography ?
Further we'll learn how we can perform Encryption and Decryption
and much more cool stuffs...!!!
SECTION 5 :
most exciting Section
Introduction
What is Phishing Attack ?
We gonna learn how an attacker do phishing attacks.
here we'll mirror any website
We'll also learn how we can clone Facebook , Instagram , twitter or any social media
installation of PHP
starting of PHP server
Run the Cloned Website in your LocalHost
Then uploading the files online
Run the Cloned Website Online
Learn Social Engineering
Share the link to the Victim and get the Username and the Password once the Victim tries to Login
and then creating an app of the cloned website
Share the Android App with the victim
Again learn how to do Social Engineering so that the Victim downloads the App
Get the Username and the Password once the Victim tries to Login from the APP
So in this section , we'll see how an attacker sends a link or an app to the victim and once the victim tries to login with login credentials , bang , victims password is with the attacker .
and much more cool stuffs...!!!!
SECTION 6 :
next section is pretty much interesting
we'll see how we can do port forwarding
generate an HTTP or HTTPS url Link
how by simply sending a link an attacker gets complete camera access
and receives the photographs after every few interval of time of the victim.
Next we'll see how to Uninstall such Dangerous Package
We will learn how to stay safe
Prevent from getting Hacked
Learn how to Aware your Family Members and known person by teaching them how to stay protected
and much more cool stuffs...!!!!
OPTIONAL SECTION :
this section named as optioal section , we gonna cover various tools which can be very handy for the rooted android device.
Ok so those who are having rooted android device can go through this section.
Learn working of Wifi Network
Learn what is AIRCRACK-NG
Installation of the package
Learn how to use AIRMON-NG
and much more cool stuffs to be added up...!!!!
REWARD ( BONUS) SECTION :
and last but not the least we have bonus section.
We'll see how we'll run kali Linux in our Android device
No need to Root your Android Device
Apps to install
Installation of Kali Linux
Learn using SSH Client
Turn your Android Device into a Penetration Testing and Ethical Hacking Device
and much more cool stuffs to be added up...!!!!
So all the sections will cover Quizzes , Assignments and Reading Materials .
Also , all the sections will be updated on regular basis and new sections will also be added up , so once you are enrolled in the course , you'll surely gonna learn various techniques how attackers attack and how we can safe ourselves from getting attacked.
Most importantly , this course is completely for educational purpose
all the attacks which an attacker perform are demonstrated to you so that you understand the technology and the art behind it and you're not fooled by any kind of social engineering.
This course is for educational and awareness purpose , to make everyone aware and be safe and protect your data.
Its a request , please do not perform any illegal activities , Udemy and me ( Debayan Dey ) is not responsible for your illegal activities you perform.
so, Welcome to the world of complete android Ethical hacking practical course.
Feel Free to Reach out at any point of time , i will be happy to Help you , and if you face any PROBLEM , just post your DOUBTS , you will be Answered within 24hrs to 48hrs of time ..!!!!!
ARE YOU EXCITED to learn 100% complete practical course and help your family stay secured and safe from data theft and from hackers ?
Wish you all the best...!!!!
See you in the course landing page ....!!!!
Who this course is for: Mobile Hacking Beginners who want to Learn Cyber Security Android Hacking Beginners who are curious about Ethical Hacking Beginner BASH Scripting Learn Phishing Attack PHP Programmers who wants to learn Ethical Hacking Learn Social Engineering and help others by sharing your knowledge and making them aware Metasploit Framework Learning Cryptography
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
1. Chapter 1/1. Best offer ( Use this Coupon for best Discount ).html
130 B
2. Introduction/1. Meet and Greet ...!!!.html
174 B
2. Introduction/10. what is F-Droid .mp4
5 MB
2. Introduction/11. Package Management.mp4
6.1 MB
2. Introduction/12. QA Session with instructor and various Social Media availability.html
1.2 KB
2. Introduction/2. Disclaimer and Note.html
878 B
2. Introduction/3. 5 Mins Reading Material Before we Start.html
696 B
2. Introduction/4. Introduction.mp4
5.4 MB
2. Introduction/4.1 What is Ethical Hacking .html
81 B
2. Introduction/5. Self Test.html
170 B
2. Introduction/6. What is Termux .mp4
17 MB
2. Introduction/7. What is Shell .mp4
3.9 MB
2. Introduction/8. Why Termux .mp4
10.5 MB
2. Introduction/9. Installation.mp4
5.2 MB
3. Termux Basics/1. Rate the Course.html
378 B
3. Termux Basics/10. Optional Reading Material Update Package Lists.html
1.1 KB
3. Termux Basics/11. apt-show.mp4
6.7 MB
3. Termux Basics/12. hidden files , versions and CD commands.mp4
6.6 MB
3. Termux Basics/13. Nano and Cat commands.mp4
9.6 MB
3. Termux Basics/14. PWD and touch command.mp4
10.4 MB
3. Termux Basics/15. mkdir command.mp4
6.1 MB
3. Termux Basics/16. use of cd command.mp4
7.4 MB
3. Termux Basics/17. use of mv command.mp4
17.6 MB
3. Termux Basics/18. use of rm command.mp4
7.3 MB
3. Termux Basics/19. mix use of cp , mv and touch command.mp4
7.1 MB
3. Termux Basics/2. Installing TERMUX from Google Play Store.mp4
12.5 MB
3. Termux Basics/20. use of uname command.mp4
4.1 MB
3. Termux Basics/21. use of ifconfig command.mp4
5.5 MB
3. Termux Basics/22. know your IP address.mp4
5.1 MB
3. Termux Basics/23. use of Ping command.mp4
2.7 MB
3. Termux Basics/24. use of chmod command.mp4
7.6 MB
3. Termux Basics/25. use of cal and proc command.mp4
15.9 MB
3. Termux Basics/26. use of git clone and wget command.mp4
17 MB
3. Termux Basics/27. Various Other Useful Commands.html
1.6 KB
3. Termux Basics/3. Storage Setup , Update and Upgrade Command.mp4
22 MB
3. Termux Basics/4. Why we use apt .mp4
29.3 MB
3. Termux Basics/5. apt Command in Linux.html
6 KB
3. Termux Basics/6. Remove Package.mp4
9.1 MB
3. Termux Basics/7. You can also download Hackers Keyboard from Google Play Store.html