The Complete Android Ethical Hacking Practical Course (CAEHP)
Master Android Ethical Hacking with a 100% real-world practical approach. Learn how to Prevent Facebook, Instagram, and other social media channels from hacking!
IT and Software ,Network and Security,Ethical Hacking
Lectures -75
Resources -1
Duration -5 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
The Complete Android Ethical Hacking Practical Course is designed for anyone who is interested in learning how an attacker attacks and gets information from the victim.
The CAEHP was created with the understanding that the majority of us do not regularly use laptops or other computers for work. Because of this, you are not required to have a laptop or computer system for this course. All you need is an Android device for this 100% practical course. And, the most important thing, you need not root your Android device.
I am Debayan Dey, a Certified Secure Computer User (CSCU) v2 and Certified Ethical Hacker (CEH V10) from the EC Council.
I am also a certified Google IT support from Google and currently doing a micro master in the Field of Cyber Security from Rochester Institute of Technology (RIT) New York in edX.
Here are a few of my other accomplishments in the field of cybersecurity:
Introduction to Cyber Attacks, New York University.
introduction to Cyber Security for Business, University of Colorado System.
Palo Alto Networks academy cybersecurity foundation, Palo Alto Networks.
International cyber conflicts, The State University of New York.
Cyber Attacks Countermeasures, New York University.
Networking and Security Architecture with Vmware NSX.
Enterprise System Management and Security, University of Colorado System.
Rest we'll have a meet and greet section to know other Learners ...!!!
The Complete Android Ethical Hacking Practical Course Overview
First of all, you should know that this course is not limited to time.
You may see 6 or 7 sections right now, but as you progress through the course over the next few weeks, you'll notice that more sections and videos have been added. The benefit of completing this course is that you'll receive regular updates on new features and attacks, as well as information on how you can defend yourself against them.
so currently, in the CAEHP course, we have 6 Sections, 1 Optional Section and 1 Bonus Section
Section 1:
Meet and Greet
Introduction of the Section
What is Termux?
What is Shell?
Why Termux?
Installation
What is F-Droid?
Package Management
Q/A Session with an instructor and various Social Media availability
So, we'll turn our Android device into a completely ethical hacking powerful device by installing Termux.
Section 2:
Next, we'll cover, Termux basics by learning various CLI commands.
Installing Termux from the Google Play Store
Storage Setup, Update, and Upgrade
Learn why we use apt
hidden files, versions
Various Text Editor
Learn how to check IP
Various other Network Related Commands
Learn why we change various modes
Learn how to use GIT Repository
and much more cool stuff...!!!!
Section 3:
There we'll cover one of the most powerful tools in penetration testing and ethical hacking, i.e. Metasploit Framework.
We'll see how an attacker creates payloads
perform LAN and WAN i.e. local area network and wide area network attacks
using port forwarding
and how the attacker creates persistent Payload
Learn BASH Scripting
and how an attacker takes control of the victim's mobile device and gets all the data.
and much more cool stuff...!!!
Section 4:
Next, we'll learn what is Encryption
what is Decryption
how we can encrypt our files
how we can Decrypt our files
Learn how we can protect our files and folders with passwords
so in this section, we'll cover the installation of 3 very important tools used for Encryption and Decryption in Linux
What is SALT in Cyprography?
Further, we'll learn how we can perform Encryption and Decryption
and much more cool stuff...!!!
Section 5:
Most exciting Section
Introduction
What is a Phishing Attack?
We are going to learn how an attacker does phishing attacks.
here we'll mirror any website
We'll also learn how we can clone Facebook, Instagram, Twitter, or any social media
installation of PHP
starting of the PHP server
Run the Cloned Website in your LocalHost
Then upload the files online
Run the Cloned Website Online
Learn Social Engineering
Share the link with the Victim and get the Username and the Password once the Victim tries to log in
Creating an app for the cloned website
Share the Android App with the victim
Again learn how to do Social Engineering so that the Victim downloads the App
Get the Username and the Password once the Victim tries to log in from the APP
So in this section, we'll see how an attacker sends a link or an app to the victim and once the victim tries to log in with login credentials, bang, the victim's password is with the attacker.
and much more cool stuff...!!!!
Section 6:
The next section is pretty interesting
we'll see how we can do port forwarding
generate an HTTP or HTTPS URL Link
how by simply sending a link an attacker gets complete camera access
and receives the photographs after every few intervals of time of the victim.
Next, we'll see how to Uninstall such a Dangerous Package
We will learn how to stay safe
Prevent from getting Hacked
Learn how to be aware of your Family Members and known people by teaching them how to stay protected
and much more cool stuff...!!!!
Bonus Section:
And, last but not least we have a bonus section.
We'll see how we'll run Kali Linux on our Android device
No need to Root your Android Device
Apps to install
Installation of Kali Linux
Learn using SSH Client
Turn your Android Device into a Penetration Testing and Ethical Hacking Device
and much more cool stuff to be added up...!!!!
So all the sections will cover Quizzes, Assignments, and Reading Materials.
If you join the course, you'll undoubtedly understand different strategies of how attackers attack and how we may protect ourselves from being attacked. Also, all the sections will be updated on a regular basis, and new sections will also be introduced.
Most importantly, this course is completely for educational purposes
All the attacks that an attacker performs are demonstrated to you so that you understand the technology and the art behind it and you're not fooled by any kind of social engineering.
This course is for educational and awareness purposes, to make everyone aware and be safe and protect your data.
It is a request that, please do not perform any illegal activities, Tutorialspoint and I ( Debayan Dey ) are not responsible for the illegal activities you perform.
Goals
Transform your Android Device into an Advance Ethical Hacking Machine.
Any Social Media Hacking as PRO Attacker and make people aware of such an attack.
Metasploit Framework.
Learn how to Use Termux from Scratch.
PORT Forwarding.
Clone any Website.
What is Shell?
BASH Scripting.
What is F-Droid and its Importance.
Package Management.
Learn various CLI commands and use it like a Pro Penetration Tester.
LAN Attack.
WAN Attack.
Learn how to make a Persistent Payload
Cyber Security Terminology.
Metasploit Architecture.
Phishing Attack.
Run Kali Linux on your Android Device without Root.
Vulnerability, Exploit, Payload.
Bind Shell and Reverse Shell.
PHP Programming Basics.
Ways to Prevent Cyber Attacks.
3 Essential Tools of Encryption and Decryption.
Learn Encryption and Decryption.
How to access the Front Camera of the Victim.
Protect Your files with Passwords.
Installing PHP and Starting the Server.
Convert your Phishing Website into an Android App.
using of Hackers Keyboard.
Social Engineering.
What is SALT in Cryptography?
Prerequisites
Android Device.
Internet.
No Computer.
No Laptop.
Ethical Hacking Mindset.
zeal to learn.
Share your learning with your family, friends, and everyone you know by making them aware of the cyber Attacks.
No Illegal Activities.
Curriculum
Check out the detailed breakdown of what’s inside the course
Section 1 - Introduction
11 Lectures
- Course Preview 05:54 05:54
- Section Introduction 01:03 01:03
- What is Termux ? 02:51 02:51
- What is shell 01:02 01:02
- Why Termux ? 01:59 01:59
- Installation 00:49 00:49
- What is FDroid ? 01:05 01:05
- Package Management 01:23 01:23
- Meet AND Greet !
- Importance of Ethical Hacking?
- Entire Course Reading Material
Termux Basics
21 Lectures
Metasploit Framework
23 Lectures
Protect your files with Encryption
5 Lectures
Phishing Attack and how to Prevent Unknown Threats
6 Lectures
How an attacker access your Front Camera
3 Lectures
Access Front Camera and Back Camera of your Victims Android Device 100% Working
4 Lectures
Reward Section
1 Lectures
Instructor Details
DEBAYAN DEY
Hey everyone! I'm Debayan Dey, and I'm thrilled to be part of the instructor community, where I can channel my enthusiasm for creating engaging e-learning content. With over three years of experience in supporting learners, I'm dedicated to providing you with accurate information and guiding you on your educational journey.
My expertise lies in IT support, Unity 3D and software development, where I've honed my skills in developing captivating 2D, 3D, and multiplayer games, as well as cutting-edge Augmented Reality Apps. Alongside my passion for e-learning, I hold certifications as a Google IT Support Engineer, CEH v10, CSCU v2, and DJI Drone Pilot. Photography is another outlet for my creative spirit, and you can find glimpses of my adventures on my Instagram travel blog, "thenewagetraveller." Additionally, I'm excited to share my insights and experiences through my dynamic YouTube channel (link shared in my bio).
Supporting a community of 200,000+ students from 100+ countries has been an incredibly rewarding experience. Your enthusiasm fuels my dedication to provide top-notch teaching guidance. I'm here to answer your questions and assist you every step of the way. Let's embark on this learning adventure together, as I'm committed to helping you unlock your true potential.
Stay tuned for exciting new courses on programming, online marketing, designing, hacking, and more. I'm eager to share my knowledge with you and empower you with valuable skills. Get ready to dive in and discover the world of possibilities that awaits.
Remember, my passion for e-learning and supporting learners drives me forward. Together, let's embrace the joy of learning and achieve great things!
Course Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now