The Complete Android Ethical Hacking Practical Course C|AEHP
1 day ago
IT & Software
[100% OFF] The Complete Android Ethical Hacking Practical Course C|AEHP

100% Hands-On Real World Practical Approach on Android Ethical Hacking. Learn to Prevent FACEBOOK , INSTAGRAM hacking!

4.5
137,312 students
5.5h total length
English
$0$34.99
100% OFF

Course Description

Course Update: Metasploit Issue Resolved!

Hello Everyone,

Welcome to the CAEHP, which stands for the Complete Android Ethical Hacking Practical Course.

I'm Debayan Dey, your instructor for this exciting course. CAEHP is all about hands-on practical learning in the world of Android Ethical Hacking!

This course is designed for anyone interested in understanding how attackers operate and extract information from their victims. What makes CAEHP unique is that you don't need a laptop or computer for this journey. All you need is an Android device because this course is 100% practical!

Isn't that amazing?

Plus, you don't even need to root your Android device. Yes, you read that right! All you need is your Android phone, and you can transform it into a powerful ethical hacking machine.

A little about me: I hold certifications like Certified Secure Computer User (CSCU) v2, Certified Ethical Hacker (CEH V10) from EC COUNCIL, and Google IT support certification from Google. Currently, I'm pursuing a micromaster in Cyber Security from the Rochester Institute of Technology (RIT) in New York through edx. I've also completed courses from prestigious institutions like New York University and The State University of New York.

Now, let's dive into what you can expect from the CAEHP COURSE.

Firstly, this course doesn't have a time limit. As you progress, you'll find that new sections and videos are added regularly. This ensures you stay up-to-date with the latest features, attacks, and how to protect yourself.

Currently, CAEHP has 6 Sections, 1 Optional Section, and 1 Bonus Section:

SECTION 1: Meet and Greet

  • Introduction to the Section

  • What is Termux?

  • What is Shell?

  • Why Termux?

  • Installation

  • What is F-Droid?

  • Package Management

  • Q/A Session with the instructor and Social Media contacts

Introduction to the Section

What is Termux?

What is Shell?

Why Termux?

Installation

What is F-Droid?

Package Management

Q/A Session with the instructor and Social Media contacts

SECTION 2: Termux Basics

  • Installing TERMUX from Google Play Store

  • Storage Setup, Update, and Upgrade

  • Why we use apt

  • Hidden files, versions

  • Various Text Editors

  • Learning how to check IP

  • Various other Network-Related Commands

  • Learning how to use GIT Repository

  • And much more!

Installing TERMUX from Google Play Store

Storage Setup, Update, and Upgrade

Why we use apt

Hidden files, versions

Various Text Editors

Learning how to check IP

Various other Network-Related Commands

Learning how to use GIT Repository

And much more!

SECTION 3: Metasploit Framework

  • Payload creation

  • LAN and WAN attacks

  • Port forwarding

  • Creating persistent Payload

  • BASH Scripting

  • Gaining control of a victim's mobile device

  • And much more!

Payload creation

LAN and WAN attacks

Port forwarding

Creating persistent Payload

BASH Scripting

Gaining control of a victim's mobile device

And much more!

SECTION 4: Encryption and Decryption

  • What is Encryption

  • What is Decryption

  • File encryption and decryption

  • Protecting files and folders with passwords

  • Installing important encryption tools in Linux

  • Understanding SALT in Cryptography

  • Performing Encryption and Decryption

  • And much more!

What is Encryption

What is Decryption

File encryption and decryption

Protecting files and folders with passwords

Installing important encryption tools in Linux

Understanding SALT in Cryptography

Performing Encryption and Decryption

And much more!

SECTION 5: Phishing Attack

  • Introduction

  • What is a Phishing Attack?

  • Mirroring websites

  • Cloning social media sites like Facebook, Instagram, and Twitter

  • Learning PHP

  • Running a cloned website on your LocalHost

  • Uploading the files online

  • Running the cloned website online

  • Social Engineering techniques

  • And much more!

Introduction

What is a Phishing Attack?

Mirroring websites

Cloning social media sites like Facebook, Instagram, and Twitter

Learning PHP

Running a cloned website on your LocalHost

Uploading the files online

Running the cloned website online

Social Engineering techniques

And much more!

SECTION 6: Camera Access and Uninstallation

  • Port forwarding

  • Generating HTTP or HTTPS URL links

  • Gaining camera access through a link

  • Receiving victim's photographs

  • Uninstalling dangerous packages

  • Staying safe and preventing hacking

  • Teaching family and friends how to stay protected

Port forwarding

Generating HTTP or HTTPS URL links

Gaining camera access through a link

Receiving victim's photographs

Uninstalling dangerous packages

Staying safe and preventing hacking

Teaching family and friends how to stay protected

OPTIONAL SECTION: For Rooted Android Devices

  • Understanding Wi-Fi networks

  • Learning about AIRCRACK-NG

  • Installation of the package

  • Using AIRMON-NG

  • And much more for rooted devices!

Understanding Wi-Fi networks

Learning about AIRCRACK-NG

Installation of the package

Using AIRMON-NG

And much more for rooted devices!

BONUS SECTION: Running Kali Linux on Android

  • No need to root your Android device

  • Installing Kali Linux

  • Using SSH Client

  • Transforming your Android Device into a Penetration Testing and Ethical Hacking Device

No need to root your Android device

Installing Kali Linux

Using SSH Client

Transforming your Android Device into a Penetration Testing and Ethical Hacking Device

Each section includes quizzes, assignments, and reading materials. We will regularly update the course with new content, ensuring you stay ahead of the latest attack techniques and defenses.

Please remember, this course is for educational and awareness purposes only. We demonstrate attacks so you can understand the technology and art behind them and protect yourself from social engineering. We do not condone or support any illegal activities.

Feel free to reach out anytime; I'm here to help. If you encounter any problems, post your doubts, and you'll receive a response within 24 to 48 hours.

Are you excited to embark on this 100% practical course, learn valuable skills, and help your family stay secure from data theft and hackers?

Best of luck, and I'll see you on the course landing page!

Similar Courses