Certified Ethical Hacking with Android Hacking 2016

Learn to become a successful penetration tester to test and capture the vulnerabilities on your network
1.3 (2 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
33 students enrolled
$19
$20
5% off
Take This Course
  • Lectures 100
  • Length 13.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 5/2016 English

Course Description

  • In this course we will learn to enter the world of professional hacking.
  • This Certified Ethical Hacking course will ensure that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems..
  • We will ensure that you learn the security of critical information assets, it is essential to become familiar with the strategies.

Ethical hacking is somewhat a complicated term to understand. Breaching network for the purpose of keeping them safe and finding Zero-day-vulnerabilities are the prime concerns of and Ethical Hacker. Anti-Hacking is more important that just attacking. This course will take you through the basics of computer networking and Linux along with the expertise in it. This course is not recommended for extreme beginners. People having basics in programming like C or Python will find it easier to understand.

Most of the parts in the tutorials will be covered under either Linux or Debian. You won’t need a multiple computers as a victim and a target. The required basics and software requirements are stated in the tutorials which will help you create your own home lab for penetration testing. The chapters in the tutorials are somewhat related to the official CEH course from EC-Council, but here, you get absolute practical knowledge. Unlike the official CEH course, this course is intended to give you as much practical testing as possible.

Most of the softwares used are totally open source and free. This provides an upper-hand in repository management for Linux distributions. The course will start with the basics of windows hacking and will end up with the extremes in networking vulnerabilities and linux programming. All the tutorials are for educational purpose only.

What are the requirements?

  • Basic Computer Knowledge
  • Passion to learn
  • Basic Networking(CCNA recommended)
  • Basics of Linux or UNIX

What am I going to get from this course?

  • To Secure your network and test the security of your surrounding area.
  • To learn to become a Certified Hacker and gather a good understanding of networking, social engineering and Hardware hacking.
  • Hacking Android

What is the target audience?

  • Students
  • Professionals
  • Anyone who wants to learn how to secure themselves from Cyber Crime.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction to Ethical Hacking
Introducction Ethical Hacking
Preview
11:00
Prerequisites & Downloadables
09:50
Types of Attacks
Preview
09:43
Ethical Hacking Commandments
09:45
Basic Necessary Tools
Preview
10:18
Section 2: FootPrinting and Reconnaissance
Ping Utility
07:40
Ping Utility Continued
05:45
NSLookup
Preview
06:16
NSLookup Continued
06:22
Gathering Information
10:16
Email Tracking
12:35
Web Browsers and Privacy
08:43
Firebug and Httrack
08:40
Web Data Extraction and Search Diggity
08:33
Section 3: Scanning
IP Scanning and Network Infrastructure
09:18
ID Server and Zenmap
09:01
Monitoring TCP_IP connections
11:39
Nmap, Zenmap and LanGuard
07:02
Netscan, Lansurveyor and Ping tools
05:48
Nessus and GNI
06:43
Proxy switcher and GNI
06:14
Section 4: Enumerating Targets
Installing Kali Linux Part 1
05:43
Installing Kali Linux Part 2
06:30
OS detection with Nmap_part 01
08:37
OS detection with Nmap_part 02
03:45
Aggressive Scanning
11:14
WebSite Cloning
11:20
Gathering fake website Intel
10:45
Debian and Linux Basics Commands
08:29
Continuation of Debian and Linux Basics Commands
04:40
Other Pentesting Distributions and SSH control
08:08
Continuation of Other Pentesting Distributions and SSH control
06:06
Remote Connections and Port scanning
11:38
Faking Digital Certificates
07:08
Continuation of Faking Digital Certificates
06:21
Section 5: Other Operating Systems
Backbox and Parrot OS
05:21
Continuation of Backbox and Parrot OS
07:33
Tracing down files and Gathering Metadata
06:56
Continuation of Tracing down files and Gathering Metadata
07:20
Section 6: Android Hacking
Android USB Debugging tools
11:29
Bypassing Android Lockscreen password and gesture
07:25
Continuation of Bypassing Android Lockscreen password and gesture
06:15
Whatsapp Crypt8 Encryption
11:24
Capturing Whatsapp Database and Encryption Keys
06:18
Continuation of Capturing Whatsapp Database and Encryption Keys
08:13
Decrypting Whatsapp Database and Scripts
05:10
Continuation of Decrypting Whatsapp Database & Creating Scripts
08:41
Creating Android Malware
06:01
Continuation of Creating Android Malware
06:26
Section 7: Wireless hacking
Wireless Security
07:39
Continuation of Wireless Security
05:39
WEP Key Encryption
11:29
WPA, WPA2 and TKIP Encryption
11:07
Types of Wireless Attacks
08:37
Securing Wireless Infrastructure
11:41
Continuation of Securing Wireless Infrastructure
07:20
Further Continuation of Securing Wireless Infrastructure
07:28
Aircrack-ng
06:36
Continuation of Aircrack-ng
06:15
Spoofing IP Address on any Gateway
07:57
Continuation of Spoofing IP Address on any Gateway
06:05
Spoofing MAC address, Credential harvesting, and bluetooth sniffing
06:34
Continuation of Spoofing MAC address, Credential harvesting, and bluetooth s
06:56
Section 8: Digital Forensics
Digital forensics and Data Recovery
08:34
Data Recovery with EaseUS
11:48
HDD repair with Check Flash
06:52
Continuation of HDD repair with Check Flash
06:52
Flash Drive and Hard Drive hack with Chip Genius
08:59
Continuation of Flash Drive and Hard Drive hack with Chip Genius
08:38
H2testw, Low level formatting and Parition Imaging with Safecopy
06:56
Continuation of H2testw, Low level formatting and Parition Imaging with Safe
08:38
Data Recovery on Formatted Cell Phones
06:05
Continuation of Data Recovery on Formatted Cell Phones
07:25
Section 9: Hacking Computers
Bypassing Windows 7_8_10 password
06:14
Bypassing Windows 7_8_10 password Continued
07:39
Continuation of Bypassing Windows 7_8_10 password
07:53
Further Continuation of Bypassing Windows 7_8_10 password
07:34
Remote hacking with Trojans
11:19
Continuation of Remote hacking with Trojans
09:17
Further Continuation of Remote hacking with Trojans
06:32
Section 10: Cracking Windows
Cracking Windows hash with Ophcrack
11:12
Ophcrack with Kali Live and Konboot
10:23
Advanced Remote hacking with System roles and Admin Access
06:30
Continuation of Advanced Remote hacking with System roles and Admin Access
06:21
Further Continuation of Advanced Remote hacking with System roles and Admin
12:34
Gaining System32 Access and cracking SAM password remotely
07:52
Continuation of Gaining System32 Access and cracking SAM password remotely
09:36
Section 11: Web Attacks
Knoppix Live
12:11
Termineter tool for hacking smart meters
10:48

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Naps Tecnologia Academy Inc, Master, MCSA, MCSE ,MCP, MCDST, A+, Network+, Security+

Naps Tecnologia Academy Inc - Formaciones en Linea ahora pasa ser una academia de instructores Certificados en varias áreas de IT, Seguridad, Información, Proyectos y mucho mas! Disponemos de Cursos en categorías de Financias, Mobile Apps, Diseño y Multimedia, Redes, entre otros incluyendo cursos tanto en español como en ingles!

Responsable: CEO Juan Carlos Rodríguez García
Empresa: Naps Tecnologia Inc - Formaciones en Línea
Web: (En remodelación)

Certificaciones del CEO: MCT, MCSA, MCSE ,MCP, MCDST, A+, Network+, Security+, MVP 2010, MCITP y otras….

Experiencia del CEO:
Cuento con más de 15 años de experiencia en el campo de las computadoras y sistemas de información. Poseo un Bachillerato de la Universidad del Turabo y más de 30 certificaciones en el área de Servidores, Ethical Hacking, Windows Server y otras.

Autor de los libros:

  • El Arte del Hacking
  • Conviértete en un Ethical Hacker
  • Aprende Redes y Servidores
  • Aprende Joomla!
  • Aprende Windows 8
  • TOP SECRET

En el año 2010 fui elegido MVP “Microsoft Value Professional” en el área de Windows Experience. Este galardón se lo entrega Microsoft a diferentes profesionales en diferentes plataformas a nivel mundial. Me desempeño como Instructor y está certificado como: Microsoft Certified Trainer.

Actualmente dirijo la corporación del Colegio de Informática y Tecnología de Puerto Rico, institución licenciada por el Consejo de Educación de Puerto Rico.

Ready to start learning?
Take This Course