The Complete Android Ethical Hacking Practical Course C|AEHP
- Description
- Curriculum
- FAQ
- Reviews
New Annoucement : Course Update for September Month
Hello Everyone !
Welcome to the CAEHP i.e. the Complete Android Ethical Hacking Practical Course .
My name is DEBAYAN DEY and i will be your Instructor for the CAEHP Course.
CAEHP is one of the Most Comprehensive Real World 100% Hands-On Practical Approach on Android Ethical Hacking…!!!
Now this course is designed for anyone who is interested in learning how an attacker attack and get the information from the victim.
CAEHP is designed by keeping in mind that most of us are not having laptops or computer machine to work for most of the time. Thats why in this course curriculum , you need not require any laptop or computer system.
Only you need an android device and this entire course is 100% practical based !
isn’t this amazing ???
Yess , plus the most important thing , you need not to root your Android device.
waaoo !!! so all in one , you just require an android phone and turn it into powerful ethical hacking machine.
Lil brief about my name , i am Certified Secure Computer User (CSCU) v2 , and Certified Ethical Hacker (CEH V10) from EC COUNCIL
also i am certified Google IT support from Google , and currently doing micromaster in the Field of Cyber Security from Rochester institute of technology (RIT) New York in edx .
here are few of my other accomplishments in the field of cyber security ,
-
Introduction to Cyber Attacks , New York University
-
introduction to Cyber security for business , University of Colorado System
-
Palo Alto Networks academy cybersecurity foundation , Palo alto networks
-
International cyber conflicts , The State University of New York
-
Cyber Attacks Countermeasures , New York University
-
Networking ans security Architecture with Vmware NSX
-
Enterprise System Management and security ,University of Colorado System
Rest we’ll have a meet and greet section to know other Learners …!!!
so whats there in this CAEHP COURSE?
First of all i would love to tell you , that this course is not limited to time .
You may see 6 or 7 section today , once you land in this course after few weeks , you’ll see more sections and videos are added up. so this is the advantage of taking this course that you’ll get regular updates about the new features and attacks and how you , as an individual can prevent yourself from such an attack.
so currently in CAEHP course , we have 6 Section + 1 Optional Section and 1 Bonus Section
SECTION 1 :
-
Meet and Greet
-
Introduction of the Section
-
What is Termux ?
-
What is Shell ?
-
Why Termux ?
-
Installation
-
What is F-Droid ?
-
Package Management
-
Q/A Session with instructor and various Social Media availability
So , we’ll turn our Android device to a complete ethical hacking powerful device by installing termux.
SECTION 2 :
-
Next we’ll cover , termux basics by learning various CLI commands.
-
Installing TERMUX from Google Play Store
-
Storage Setup , Update and Upgrade
-
Learn why we use apt
-
hidden files , versions
-
Various Text Editor
-
Learn how to check IP
-
Various other Network Related Commands
-
Learn why we change various modes
-
Learn how to use GIT Repository
-
and much more cool stuffs…!!!!
SECTION 3 :
-
There after we’ll cover one of the most powerful tool in penetration testing and ethical hacking , i.e. Metasploit Framework.
-
We’ll see how an attacker create payloads
-
perform LAN and WAN i.e local area network and wide area network attacks
-
using port forwarding
-
and how the attacker creates persistent Payload
-
Learn BASH Scripting
-
and how an attackers takes the control of the victims mobile device and get all the data.
-
and much more cool stuffs…!!!
SECTION 4 :
-
next we’ll learn what is Encryption
-
what is Decryption
-
how we can encrypt our files
-
how we can Decrypt our files
-
Learn how we can protect our files and folders with passwords
-
so in this section we’ll cover installation of 3 very important tools used for Encryption and Decryption in Linux
-
What is SALT in Cyprography ?
-
Further we’ll learn how we can perform Encryption and Decryption
-
and much more cool stuffs…!!!
SECTION 5 :
-
most exciting Section
-
Introduction
-
What is Phishing Attack ?
-
We gonna learn how an attacker do phishing attacks.
-
here we’ll mirror any website
-
We’ll also learn how we can clone Facebook , Instagram , twitter or any social media
-
installation of PHP
-
starting of PHP server
-
Run the Cloned Website in your LocalHost
-
Then uploading the files online
-
Run the Cloned Website Online
-
Learn Social Engineering
-
Share the link to the Victim and get the Username and the Password once the Victim tries to Login
-
and then creating an app of the cloned website
-
Share the Android App with the victim
-
Again learn how to do Social Engineering so that the Victim downloads the App
-
Get the Username and the Password once the Victim tries to Login from the APP
-
So in this section , we’ll see how an attacker sends a link or an app to the victim and once the victim tries to login with login credentials , bang , victims password is with the attacker .
-
and much more cool stuffs…!!!!
SECTION 6 :
-
next section is pretty much interesting
-
we’ll see how we can do port forwarding
-
generate an HTTP or HTTPS url Link
-
how by simply sending a link an attacker gets complete camera access
-
and receives the photographs after every few interval of time of the victim.
-
Next we’ll see how to Uninstall such Dangerous Package
-
We will learn how to stay safe
-
Prevent from getting Hacked
-
Learn how to Aware your Family Members and known person by teaching them how to stay protected
-
and much more cool stuffs…!!!!
OPTIONAL SECTION :
-
this section named as optioal section , we gonna cover various tools which can be very handy for the rooted android device.
-
Ok so those who are having rooted android device can go through this section.
-
Learn working of Wifi Network
-
Learn what is AIRCRACK-NG
-
Installation of the package
-
Learn how to use AIRMON-NG
-
and much more cool stuffs to be added up…!!!!
REWARD ( BONUS) SECTION :
-
and last but not the least we have bonus section.
-
We’ll see how we’ll run kali Linux in our Android device
-
No need to Root your Android Device
-
Apps to install
-
Installation of Kali Linux
-
Learn using SSH Client
-
Turn your Android Device into a Penetration Testing and Ethical Hacking Device
-
and much more cool stuffs to be added up…!!!!
So all the sections will cover Quizzes , Assignments and Reading Materials .
Also , all the sections will be updated on regular basis and new sections will also be added up , so once you are enrolled in the course , you’ll surely gonna learn various techniques how attackers attack and how we can safe ourselves from getting attacked.
-
Most importantly , this course is completely for educational purpose
-
all the attacks which an attacker perform are demonstrated to you so that you understand the technology and the art behind it and you’re not fooled by any kind of social engineering.
-
This course is for educational and awareness purpose , to make everyone aware and be safe and protect your data.
-
Its a request , please do not perform any illegal activities , Udemy and me ( Debayan Dey ) is not responsible for your illegal activities you perform.
so, Welcome to the world of complete android Ethical hacking practical course.
Feel Free to Reach out at any point of time , i will be happy to Help you , and if you face any PROBLEM , just post your DOUBTS , you will be Answered within 24hrs to 48hrs of time ..!!!!!
ARE YOU EXCITED to learn 100% complete practical course and help your family stay secured and safe from data theft and from hackers ?
Wish you all the best…!!!!
See you in the course landing page ….!!!!
-
2Meet and Greet ...!!!Text lesson
-
3Disclaimer and NoteText lesson
-
45 Mins Reading Material Before we StartText lesson
-
5IntroductionVideo lesson
-
6Self TestQuiz
This is a simple introductory test named as , "Let's understand the basic understanding..!!" . You will come across basic questions in the filed of Cyber Security .
Depending on your scores , you can rate yourself , and at the end of the course we have one more Self Test named as "Let's Test my skills again..!!".
By attempting all the Quizzes , you will get the basic understanding in the field of Cyber Security , also if you want to accelerate your career in Ethical Hacking.
-
7What is Termux ?Video lesson
-
8What is Shell ?Video lesson
-
9Why Termux ?Video lesson
Why Termux?
Now we know that termux is a Linux Terminal Emulator. But why it is so famous and sometimes called a hacking machine. Well, that’s somehow true and sometimes a piece of false information also. Termux is not a standalone hacking application. As we discussed, it’s a program that takes instructions and runs scripts. In some Linux distributions like Kali, Parrot OS, we find a lot of tools for penetration testing. Most of them are CLI based and run through the terminal. We can also install various other tools and run different scripts made for Pentesting.
So on Android, obviously you get a complete GUI environment. Where these tools won’t work without any command line utility. That is where termux is used to install such tools on your Android Platform. Our Android is also based on a modified Linux kernel. That’s why we can use Bash scripting in it. That’s why termux can easily connect to the file system to perform the majority of the set of features. Which allows you to use the Linux command line to install and run various scripts.
So that was a wrap on introduction to Termux. Let’s move to installation and basic usage.
-
10InstallationVideo lesson
-
11what is F-Droid ?Video lesson
-
12Package ManagementVideo lesson
-
13Q/A Session with instructor and various Social Media availabilityText lesson
-
14Rate the CourseText lesson
-
15Installing TERMUX from Google Play StoreVideo lesson
-
16Storage Setup , Update and Upgrade CommandVideo lesson
-
17Why we use apt ?Video lesson
-
18apt Command in LinuxText lesson
-
19Remove PackageVideo lesson
-
20You can also download Hackers Keyboard from Google Play StoreText lesson
-
21Package Management Basics: apt, yum, dnf, pkgText lesson
-
22Optional Reading Material for Knowledge : Package Management SystemsText lesson
-
23Optional Reading Material : Update Package ListsText lesson
-
24apt-showVideo lesson
-
25hidden files , versions and CD commandsVideo lesson
-
26Nano and Cat commandsVideo lesson
-
27PWD and touch commandVideo lesson
-
28mkdir commandVideo lesson
-
29use of cd commandVideo lesson
-
30use of mv commandVideo lesson
-
31use of rm commandVideo lesson
-
32mix use of " cp , mv and touch " commandVideo lesson
-
33use of uname commandVideo lesson
-
34use of ifconfig commandVideo lesson
-
35know your IP addressVideo lesson
-
36use of Ping commandVideo lesson
-
37use of "chmod" commandVideo lesson
-
38use of cal and proc commandVideo lesson
-
39use of git clone and wget commandVideo lesson
-
40Various Other Useful CommandsText lesson
-
41Advanced Termux/Linux Commands Learning in the form of Quiz for KnowledgeQuiz
Here you'll find advanced Linux/Termux Commands in the form of a quiz to help us to understand the commands in-depth in a more interactive manner .
Don't worry if you're not able to answer the questions accurately in 1st go , trust me this is our learning section , so its ok if we are unaware of the commands . Try it , later on come back to this section after few Weeks and try it again ..!!!
I know you will definitely get the full understanding ..!!
Wish you good luck
Reagrds ,
DEBAYAN DEY
-
42What is Penetration Testing ?Video lesson
-
43Optional Advanced Understanding of Penetration Testing and its StagesText lesson
-
44Advanced Penetration Testing Questions to give you indepth knowledgeQuiz
-
45What is Metasploit Framework and its HistoryVideo lesson
-
46Optional Reading Material for Metasploit FrameworkText lesson
-
47Basic Terminologies " Vulnerability"Video lesson
-
48Basic Terminologies " Exploit"Video lesson
-
49Basic Terminologies " Payload"Video lesson
-
50basic architecture of MetasploitVideo lesson
-
51Module in Architecture of MetasploitVideo lesson
-
52What is Shell , Bind Shell , Reverse ShellVideo lesson
-
53Initial Steps , ways to Prevent these Attacks and ConclusionVideo lesson
-
54READING Material "What is Social Engineering ? "Text lesson
-
55Social EngineeringQuiz
-
56installation of CPU-ZVideo lesson
-
57Optional Reading Material for CPU-ZText lesson
-
58Metasploit InstallationVideo lesson
-
59Optional Reading Material for Installing the Metasploit in TermuxText lesson
-
60alert for Database ServerVideo lesson
-
61Test the Metasploit Framework and learn what is MSFconsoleVideo lesson
-
62Help Command and Banner CommandVideo lesson
-
63Show Command ( no audio )Video lesson
-
64Show , Search Info , Use commandsVideo lesson
-
65Metasploit exploit over the LAN explainationVideo lesson
-
66Reading Material of what is LAN i.e. LOCAL AREA NETWORKText lesson
-
67complete exploit over the LANVideo lesson
-
68Reading Material " What is WAN i.e. WIDE AREA NETWORK ? "Text lesson
-
69Port Forwarding Demonstration with Data is Turned on along with hotspot (failed)Video lesson
-
70Hotspot Failure ( turning OFF again and again )Video lesson
-
71Getting confused with the LPORT while we are doing with WIFIVideo lesson
-
72learning from our mistakes perfectly working this time with wifi ( no audio)Video lesson
-
73Making our payload PERSISTENTVideo lesson
-
74Metasploit QuizQuiz
-
75What is encryption and decryptionVideo lesson
-
76Reading Material " Difference between Encryption and Decryption"Text lesson
-
77Tool1Video lesson
-
78OPTIONAL Reading Material "The Rijndael Encryption Algorithm"Text lesson
-
79Tool2Video lesson
-
80OPTIONAL Reading Material "pkzip stream cipher algorithm"Text lesson
-
81Tool3 and what is "salt" explainedVideo lesson
-
82Tool3 Continued "decryption"Video lesson
-
83OPTIONAL Reading Material "AES Algorithm"Text lesson
-
84Section IntroductionVideo lesson
-
85What is Phishing Attack ?Video lesson
-
86Mirroring WebsiteVideo lesson
-
87Installing PHP and starting the Server in localhost with port numberVideo lesson
-
88Generated the password in localhostVideo lesson
-
89Uploading files in webhosting platformVideo lesson
-
90Convert your website to an Android APPVideo lesson
-
91Advanced Phishing Attack QuestionsQuiz

External Links May Contain Affiliate Links read more