Complete Google Hacking Practical Course C|GHPC
- Description
- Curriculum
- FAQ
- Reviews
Hello everyone..!!
welcome to C|GHPC i.e. the Complete Google Hacking Practical Course .
My name is DEBAYAN DEY and I will be your Instructor for the C|GHP Course.
Now this course is designed for anyone who is interested in learning how an attacker use Google Hacking and get the information of the “Victim” by exploiting various vulnerabilities available.
C|GHPC is designed by keeping in mind that most of us are not having laptops or computer machine to work for most of the time.
That’s why in this course curriculum , you need not require any laptop or computer system.
Only you need a smartphone and this entire course is 100% practical based !
isn’t this amazing ???
yes , and according to the latest reports , Cyber Security Theft has increased tremendously in last 5 years .
So , in this course you will be learning how Google Hacking takes place and how easily an attacker gets the victims information username and passwords, various sensitive data’s related to the company , how an attacker can get the victims system information and then exploit the system and much more !!!
Everything will be explained in depth , followed with reading materials and quizzes which will give you a boost in the field of Ethical Hacking!!!
So all in one , you just require a smartphone or computer or laptop device and turn it into powerful ethical hacking machine.
Lil brief about my name , I am Certified Secure Computer User (CSCU) v2 , and Certified Ethical Hacker (CEH V10) from EC COUNCIL
also i am certified Google IT support from Google , and currently doing micromaster in the Field of Cyber Security from Rochester institute of technology (RIT) New York in edx .
here are few of my other accomplishments in the field of cyber security ,
-
Introduction to Cyber Attacks , New York University
-
introduction to Cyber security for business , University of Colorado System
-
Palo Alto Networks academy cybersecurity foundation , Palo alto networks
-
International cyber conflicts , The State University of New York
-
Cyber Attacks Countermeasures , New York University
-
Networking ans security Architecture with Vmware NSX
-
Enterprise System Management and security ,University of Colorado System
Rest we’ll have a meet and greet section to know other Learners …!!!
so what’s there in this C|GHP COURSE?
so keeping these outcomes in mind , in 1st section i.e. ( What is Google Hacking ), you’ll come across
-
What is Google Hacking / Dorking ?
-
What is Open Source Intelligence ?
-
History
-
Exploring its Techniques
-
Benefits
-
Quizzes , Assignments and Reading Materials
in 2nd section i.e. ( How Google Works ? ) ,
-
How Google Works ?
-
What are Crawlers ?
-
How do They Work ?
-
How Search Engine Works ?
-
What are Keywords ?
-
Recap
-
Quizzes , Assignments and Reading Materials
next section , i.e. our 3rd Section (Understanding a URL Structure )
-
we will understand the entire URL STRUCTURE
-
Query Operator Structure
-
Understanding a URL Structure
-
(With Query Parameters)
-
various parts, broken down into pieces
-
Google Commands (tricks)
-
Quizzes , Assignments and Reading Materials
Coming to our 4th section , Hands on practical approach of Google Hacking
So this Section is having 10 Parts which will help you to understand each and every important Google Dorks with practical implementation .and in our 5th section ,
-
we will go through the important key points which will help us to protect ourselves or your organization from google dorks
-
then we will come across various Myths and Facts of google hacking
-
finally the Conclusion.
so, welcome to the world of Complete Google Hacking Practical Course .
ARE YOU EXCITED to learn 100% complete practical course and help your family stay secured and safe from data theft and from hackers ?
Wish you all the best…!!!!
See you in the course landing page ….!!!!
-
1Meet and Greet ...!!!Text lesson
-
2Course OverViewVideo lesson
Q/A
Lets Catch-up in various Social Media Platform and share our knowledge :
Youtube : https://www.youtube.com/channel/UCgm7RtBbukd_46hPPGmZcuw?sub_confirmation=1
Instagram : https://www.instagram.com/completeethicalhacking/
Facebook : https://www.facebook.com/CompleteEthicalHacking/
-
3section 1 OverviewVideo lesson
-
4What is Google Hacking ?Video lesson
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using.Google dorking could also be used for OSINT.
-
5Join our YouTube Army in Cyber SecurityText lesson
-
6OSINTVideo lesson
Open-source intelligence (OSINT) is a multi-factor (qualitative, quantitative) methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence context. In the intelligence community, the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources). OSINT under one name or another has been around for hundreds of years. With the advent of instant communications and rapid information transfer, a great deal of actionable and predictive intelligence can now be obtained from public, unclassified sources. It is not related to open-source software or collective intelligence.
-
7HistoryVideo lesson
The concept of "Google hacking" dates back to 2002, when Johnny Long began to collect Google search queries that uncovered vulnerable systems and/or sensitive information disclosures – labeling them googleDorks.
The list of Google Dorks grew into a large dictionary of queries, which were eventually organized into the original Google Hacking Database (GHDB) in 2004.
Since its heyday, the concepts explored in Google hacking (sometimes referred to as Google Dorking) have been extended to other search engines, such as Bing and Shodan. Automated attack tools use custom search dictionaries to find vulnerable systems and sensitive information disclosures in public systems that have been indexed by search engines.
-
8BenefitsVideo lesson
https://www.instagram.com/completeethicalhacking/
-
9Q/AText lesson
-
10Section 2 IntroductionVideo lesson
-
11How Google Works ?Video lesson
Now it might be rather patronizing explaining how these “Search Engines” work, but there’s a lot more going on behind the scenes then what we see.
"Search Engines" such as Google are huge indexers – specifically, indexers of content spread across the World Wide Web.
These essentials in surfing the internet use “Crawlers” or “Spiders” to search for this content across the World Wide Web
-
12What are CRAWLERS ?Video lesson
What are Crawlers and how do They Work?
These crawlers discover content through various means. One being by pure discovery, where a URL is visited by the crawler and information regarding the content type of the website is returned to the search engine. In fact, there are lots of information modern crawlers scrape – but we will discuss how this is used later. Another method crawlers use to discover content is by following any and all URLs found from previously crawled websites. Much like a virus in the sense that it will want to traverse/spread to everything it can.
-
13In-depth Explanation with ExampleVideo lesson
-
14Crawler with another exampleVideo lesson
-
15Important Reading MaterialText lesson
-
16What is SEO and how it helps in Google Hacking ?Video lesson
Search Engine Optimisation
Search Engine Optimisation or SEO is a prevalent and lucrative topic in modern-day search engines. In fact, so much so, that entire businesses capitalise on improving a domains SEO “ranking”. At an abstract view, search engines will “prioritise” those domains that are easier to index. There are many factors in how “optimal” a domain is - resulting in something similar to a point-scoring system.
To highlight a few influences on how these points are scored, factors such as:
• How responsive your website is to the different browser types I.e. Google Chrome, Firefox and Internet Explorer - this includes Mobile phones!
• How easy it is to crawl your website (or if crawling is even allowed ...but we'll come to this later) through the use of "Sitemaps"
• What kind of keywords your website has (i.e. In our examples if the user was to search for a query like “Colours” no domain will be returned - as the search engine has not (yet) crawled a domain that has any keywords to do with “Colours”
There is a lot of complexity in how the various search engines individually "point-score" or rank these domains - including vast algorithms. Naturally, the companies running these search engines such as Google don't share exactly how the hierarchic view of domains ultimately ends up. Although, as these are businesses at the end of the day, you can pay to advertise/boost the order of which your domain is displayed.
-
17Join our Insta ArmyText lesson
-
18Just a quick recap of what we have learned so far !Quiz
-
26Part 1Video lesson
-
27Part 2Video lesson
-
28Part 3Video lesson
-
29Part 4Video lesson
-
30Part 5Video lesson
-
31Part 6Video lesson
-
32Part 7Video lesson
-
33Part 8Video lesson
-
34Part 9Video lesson
-
35Part 10Video lesson
-
36Part 11Video lesson
-
37Part 12Video lesson
-
38Part 13Video lesson
-
39Part 14Video lesson
-
40Our Cyber Security ARMYText lesson

External Links May Contain Affiliate Links read more