100% Hands-On Real World Practical Approach on Android Ethical
Hacking. Learn to Prevent FACEBOOK, INSTAGRAM hacking!

This course
includes:
- 5.5 hours on-demand video
- 26 articles
- Full lifetime access
- Access on mobile and TV
- Assignments
- Certificate of completion
What you'll learn
- Transfom your Android Device
into an Advance Ethical Hacking Machine
- Instagram Hacking like pro
ATTACKER and make people people aware of such an attack
- Facebook Hacking like pro
ATTACKER and make people people aware of such an attack
- Any Social Media Hacking as
PRO Attacker and make people people aware of such an attack
- Metasploit Framework
- Learn how to Use Termux from
Scratch
- PORT Forwarding
- Clone any Website
- What is Shell ?
- BASH Scripting
- What is F-Droid and its
Importance
- Package Management
- Learn various CLI commands
and use it like a Pro Penetration Tester
- LAN Attack
- WAN Attack
- Learn how to make Persistent
Payload
- Cyber Security Terminology
- Metasploit Architecture
- Phishing Attack
- Run Kali Linux in your
Android Device without Root
- Vulnerability , Exploit ,
Payload
- Bind Shell and Reverse Shell
- PHP Programming
- Ways to Prevent Cyber
Attacks
- 3 Essential Tools of
Encryption and Decryption
- Learn Encryption and
Decryption
- How to access the Front
Camera of the Victim
- Protect Your files with
Passwords
- Installing PHP and Starting
the Server
- Convert your Phishing
Website into an Android App
- Wifi Password Cracking
- using of Hackers KeyBoard
- Social Engineering
- What is SALT in Cryptography
?
Requirements
- Android Device
- Internet
- No Computer
- No Laptop
- Ethical Hacking Mindset
- zeal to learn
- Share your learning to your family , friends
and everyone you know by making them aware about the cyber Attacks
- No Illegal Activities
Description
New Annoucement : Course Update for September Month
Hello Everyone !
Welcome to the CAEHP i.e. the Complete
Android Ethical Hacking Practical Course .
My name is DEBAYAN DEY and i will be your
Instructor for the CAEHP Course.
CAEHP is one of the Most Comprehensive Real World
100% Hands-On Practical Approach on Android Ethical Hacking...!!!
Now this course is designed for anyone who is interested in
learning how an attacker attack and get the information from the victim.
CAEHP is designed by keeping in mind that most of us are not having
laptops or computer machine to work for most of the time. Thats why in
this course curriculum , you need not require any laptop or
computer system.
Only you need an android device and this entire course is 100%
practical based !
isn't this amazing ???
Yess , plus the most important thing , you need not to root
your Android device.
waaoo !!! so all in one , you just require an android phone
and turn it into powerful ethical hacking machine.
Lil brief about my name , i am Certified
Secure Computer User (CSCU) v2 , and Certified Ethical Hacker
(CEH V10) from EC COUNCIL
also i am certified Google IT support from Google ,
and currently doing micromaster in the Field of
Cyber Security from Rochester institute of technology (RIT)
New York in edx .
here are few of my other accomplishments in the field of cyber security
,
- Introduction to Cyber Attacks , New York University
- introduction to Cyber security for business ,
University of Colorado System
- Palo Alto Networks academy cybersecurity
foundation , Palo alto networks
- International cyber conflicts , The
State University of New York
- Cyber Attacks Countermeasures , New York
University
- Networking ans security Architecture with
Vmware NSX
- Enterprise System Management and security
,University of Colorado System
Rest we'll have a meet and greet section to know other Learners ...!!!
so whats there in this CAEHP COURSE?
First of all i would love to tell you , that this course
is not limited to time .
You may see 6 or 7 section today , once you land in this course after
few weeks , you'll see more sections and videos are added up. so this is
the advantage of taking this course that you'll get
regular updates about the new features and attacks and
how you , as an individual can prevent yourself from such an
attack.
so currently in CAEHP course , we
have 6 Section + 1 Optional Section and 1
Bonus Section
SECTION 1 :
- Meet and Greet
- Introduction of the Section
- What is Termux ?
- What is Shell ?
- Why Termux ?
- Installation
- What is F-Droid ?
- Package Management
- Q/A Session with instructor and
various Social Media availability
So , we'll turn our Android device to a complete
ethical hacking powerful device by installing termux.
SECTION 2 :
- Next we'll cover , termux basics by learning
various CLI commands.
- Installing TERMUX from Google Play Store
- Storage Setup , Update and Upgrade
- Learn why we use apt
- hidden files , versions
- Various Text Editor
- Learn how to check IP
- Various other Network Related Commands
- Learn why we change various modes
- Learn how to use GIT Repository
- and much more cool stuffs...!!!!
SECTION 3 :
- There after we'll cover one of the most
powerful tool in penetration testing and ethical hacking , i.e. Metasploit
Framework.
- We'll see how an attacker create
payloads
- perform LAN and WAN i.e local
area network and wide area network attacks
- using port forwarding
- and how the attacker creates persistent
Payload
- Learn BASH Scripting
- and how an attackers takes the control of the
victims mobile device and get all the data.
- and much more cool stuffs...!!!
SECTION 4 :
- next we'll learn what is Encryption
- what is Decryption
- how we can encrypt our files
- how we can Decrypt our files
- Learn how we can protect our files and folders
with passwords
- so in this section we'll cover installation of
3 very important tools used for Encryption and Decryption in Linux
- What is SALT in Cyprography ?
- Further we'll learn how we can perform
Encryption and Decryption
- and much more cool stuffs...!!!
SECTION 5 :
- most exciting Section
- Introduction
- What is Phishing Attack ?
- We gonna learn how an attacker do
phishing attacks.
- here we'll mirror any website
- We'll also learn how we can clone
Facebook , Instagram , twitter or any social media
- installation of PHP
- starting of PHP server
- Run the Cloned Website in your LocalHost
- Then uploading the files online
- Run the Cloned Website Online
- Learn Social Engineering
- Share the link to the Victim and get the
Username and the Password once the Victim tries to Login
- and then creating an app of the cloned website
- Share the Android App with the victim
- Again learn how to do Social Engineering so
that the Victim downloads the App
- Get the Username and the Password once the
Victim tries to Login from the APP
- So in this section , we'll see how an attacker
sends a link or an app to the victim and once the victim tries to login
with login credentials , bang , victims password is with the attacker .
- and much more cool stuffs...!!!!
SECTION 6 :
- next section is pretty much
interesting
- we'll see how we can do port
forwarding
- generate an HTTP or
HTTPS url Link
- how by simply sending a
link an attacker gets complete camera access
- and receives the photographs
after every few interval of time of the victim.
- Next we'll see how to
Uninstall such Dangerous Package
- We will learn how to stay
safe
- Prevent from getting Hacked
- Learn how to Aware your
Family Members and known person by teaching them how to stay protected
- and much more cool
stuffs...!!!!
OPTIONAL SECTION :
- this section named as optioal section , we
gonna cover various tools which can be very handy for the rooted android
device.
- Ok so those who are having rooted android
device can go through this section.
- Learn working of Wifi Network
- Learn what is AIRCRACK-NG
- Installation of the package
- Learn how to use AIRMON-NG
- and much more cool stuffs to be added up...!!!!
REWARD ( BONUS) SECTION :
- and last but not the least we have bonus
section.
- We'll see how we'll run kali Linux in
our Android device
- No need to Root your Android Device
- Apps to install
- Installation of Kali Linux
- Learn using SSH Client
- Turn your Android Device into a Penetration
Testing and Ethical Hacking Device
- and much more cool stuffs to be added
up...!!!!
So all the sections will cover Quizzes , Assignments and Reading
Materials .
Also , all the sections will be updated on regular basis and new
sections will also be added up , so once you are enrolled in
the course , you'll surely gonna learn various techniques how
attackers attack and how we can safe ourselves from getting attacked.
- Most importantly , this
course is completely for educational purpose
- all the attacks which an
attacker perform are demonstrated to you so that you understand the
technology and the art behind it and you're not fooled by any kind of
social engineering.
- This course is for
educational and awareness purpose , to make everyone aware and be safe and
protect your data.
- Its a request , please do
not perform any illegal activities , Udemy and me ( Debayan Dey ) is not
responsible for your illegal activities you perform.
so, Welcome to the world of complete android Ethical
hacking practical course.
Feel Free to Reach out at any point of time , i will be
happy to Help you , and if you face any PROBLEM , just
post your DOUBTS , you will be Answered within 24hrs
to 48hrs of time ..!!!!!
ARE YOU EXCITED to learn 100% complete
practical course and help your family stay secured and
safe from data theft and from hackers ?
Wish you all the best...!!!!
See you in the course landing page ....!!!!
Who this course is for:
- Mobile Hacking
- Beginners who want to Learn
Cyber Security
- Android Hacking
- Beginners who are curious
about Ethical Hacking
- Beginner BASH Scripting
- Learn Phishing Attack
- PHP Programmers who wants to
learn Ethical Hacking
- Learn Social Engineering and
help others by sharing your knowledge and making them aware
- Metasploit Framework
- Learning Cryptography


0 Comments