Course Teacher: Debayan Dey
Language: English
Description:
New Annoucement : Course Replace for September Month
Hey Everybody !
Welcome to the CAEHP i.e. the Full Android Moral Hacking Sensible Course .
My identify is DEBAYAN DEY and that i might be your Teacher for the CAEHP Course.
CAEHP is likely one of the Most Complete Actual World 100% Fingers-On Sensible Strategy on Android Moral Hacking…!!!
Now this course is designed for anybody who’s excited by studying how an attacker assault and get the knowledge from the sufferer.
CAEHP is designed by holding in thoughts that the majority of us should not having laptops or pc machine to work for more often than not. Thats why on this course curriculum , you needn’t require any laptop computer or pc system.
Solely you want an android system and this complete course is 100% sensible based mostly !
isn’t this wonderful ???
Yess , plus crucial factor , you needn’t to root your Android system.
waaoo !!! so multi function , you simply require an android telephone and switch it into highly effective moral hacking machine.
Lil transient about my identify , i’m Licensed Safe Pc Person (CSCU) v2 , and Licensed Moral Hacker (CEH V10) from EC COUNCIL
additionally i’m licensed Google IT assist from Google , and at the moment doing micromaster within the Discipline of Cyber Safety from Rochester institute of expertise (RIT) New York in edx .
listed below are few of my different accomplishments within the area of cyber safety ,
-
Introduction to Cyber Assaults , New York College
-
introduction to Cyber safety for enterprise , College of Colorado System
-
Palo Alto Networks academy cybersecurity basis , Palo alto networks
-
Worldwide cyber conflicts , The State College of New York
-
Cyber Assaults Countermeasures , New York College
-
Networking ans safety Structure with Vmware NSX
-
Enterprise System Administration and safety ,College of Colorado System
Relaxation we’ll have a meet and greet part to know different Learners …!!!
so whats there on this CAEHP COURSE?
To begin with i might like to inform you , that this course will not be restricted to time .
You might even see 6 or 7 part right this moment , when you land on this course after few weeks , you’ll see extra sections and movies are added up. so that is the benefit of taking this course that you’ll get common updates concerning the new options and assaults and the way you , as a person can stop your self from such an assault.
so at the moment in CAEHP course , we have now 6 Part + 1 Non-obligatory Part and 1 Bonus Part
SECTION 1 :
-
Meet and Greet
-
Introduction of the Part
-
What’s Termux ?
-
What’s Shell ?
-
Why Termux ?
-
Set up
-
What’s F-Droid ?
-
Bundle Administration
-
Q/A Session with teacher and varied Social Media availability
So , we’ll flip our Android system to an entire moral hacking highly effective system by putting in termux.
SECTION 2 :
-
Subsequent we’ll cowl , termux fundamentals by studying varied CLI instructions.
-
Putting in TERMUX from Google Play Retailer
-
Storage Setup , Replace and Improve
-
Study why we use apt
-
hidden information , variations
-
Varied Textual content Editor
-
Learn to test IP
-
Varied different Community Associated Instructions
-
Study why we modify varied modes
-
Learn to use GIT Repository
-
and far more cool stuffs…!!!!
SECTION 3 :
-
There after we’ll cowl one of the vital highly effective software in penetration testing and moral hacking , i.e. Metasploit Framework.
-
We’ll see how an attacker create payloads
-
carry out LAN and WAN i.e native space community and huge space community assaults
-
utilizing port forwarding
-
and the way the attacker creates persistent Payload
-
Study BASH Scripting
-
and the way an attackers takes the management of the victims cellular system and get all the info.
-
and far more cool stuffs…!!!
SECTION 4 :
-
subsequent we’ll be taught what’s Encryption
-
what’s Decryption
-
how we are able to encrypt our information
-
how we are able to Decrypt our information
-
Find out how we are able to shield our information and folders with passwords
-
so on this part we’ll cowl set up of three crucial instruments used for Encryption and Decryption in Linux
-
What’s SALT in Cyprography ?
-
Additional we’ll find out how we are able to carry out Encryption and Decryption
-
and far more cool stuffs…!!!
SECTION 5 :
-
most enjoyable Part
-
Introduction
-
What’s Phishing Assault ?
-
We gonna be taught how an attacker do phishing assaults.
-
right here we’ll mirror any web site
-
We’ll additionally find out how we are able to clone Fb , Instagram , twitter or any social media
-
set up of PHP
-
beginning of PHP server
-
Run the Cloned Web site in your LocalHost
-
Then importing the information on-line
-
Run the Cloned Web site On-line
-
Study Social Engineering
-
Share the hyperlink to the Sufferer and get the Username and the Password as soon as the Sufferer tries to Login
-
after which creating an app of the cloned web site
-
Share the Android App with the sufferer
-
Once more learn to do Social Engineering in order that the Sufferer downloads the App
-
Get the Username and the Password as soon as the Sufferer tries to Login from the APP
-
So on this part , we’ll see how an attacker sends a hyperlink or an app to the sufferer and as soon as the sufferer tries to login with login credentials , bang , victims password is with the attacker .
-
and far more cool stuffs…!!!!
SECTION 6 :
-
subsequent part is just about fascinating
-
we’ll see how we are able to do port forwarding
-
generate an HTTP or HTTPS url Hyperlink
-
how by merely sending a hyperlink an attacker will get full digital camera entry
-
and receives the images after each few interval of time of the sufferer.
-
Subsequent we’ll see tips on how to Uninstall such Harmful Bundle
-
We are going to learn to keep protected
-
Forestall from getting Hacked
-
Learn to Conscious your Household Members and recognized individual by instructing them tips on how to keep protected
-
and far more cool stuffs…!!!!
OPTIONAL SECTION :
-
this part named as optioal part , we gonna cowl varied instruments which may be very helpful for the rooted android system.
-
Okay so those that are having rooted android system can undergo this part.
-
Study working of Wifi Community
-
Study what’s AIRCRACK-NG
-
Set up of the package deal
-
Learn to use AIRMON-NG
-
and far more cool stuffs to be added up…!!!!
REWARD ( BONUS) SECTION :
-
and final however not the least we have now bonus part.
-
We’ll see how we’ll run kali Linux in our Android system
-
No have to Root your Android System
-
Apps to put in
-
Set up of Kali Linux
-
Study utilizing SSH Consumer
-
Flip your Android System right into a Penetration Testing and Moral Hacking System
-
and far more cool stuffs to be added up…!!!!
So all of the sections will cowl Quizzes , Assignments and Studying Supplies .
Additionally , all of the sections might be up to date on common foundation and new sections will even be added up , so as soon as you’re enrolled within the course , you’ll absolutely gonna be taught varied methods how attackers assault and the way we are able to protected ourselves from getting attacked.
-
Most significantly , this course is totally for academic goal
-
all of the assaults which an attacker carry out are demonstrated to you so that you just perceive the expertise and the artwork behind it and also you’re not fooled by any sort of social engineering.
-
This course is for academic and consciousness goal , to make everybody conscious and be protected and shield your knowledge.
-
Its a request , please don’t carry out any unlawful actions , Udemy and me ( Debayan Dey ) will not be answerable for your unlawful actions you carry out.
so, Welcome to the world of full android Moral hacking sensible course.
Really feel Free to Attain out at any level of time , i might be comfortable to Allow you to , and for those who face any PROBLEM , simply publish your DOUBTS , you may be Answered inside 24hrs to 48hrs of time ..!!!!!
ARE YOU EXCITED to be taught 100% full sensible course and assist your loved ones keep secured and protected from knowledge theft and from hackers ?
Want you all the perfect…!!!!
See you within the course touchdown web page ….!!!!
Who this course is for:
- Cellular Hacking
- Newcomers who need to Study Cyber Safety
- Android Hacking
- Newcomers who’re interested by Moral Hacking
- Newbie BASH Scripting
- Study Phishing Assault
- PHP Programmers who needs to be taught Moral Hacking
- Study Social Engineering and assist others by sharing your data and making them conscious
- Metasploit Framework
- Studying Cryptography

