Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

The Complete Android Ethical Hacking Practical Course C|AEHP

100% Hands-On Real World Practical Approach on Android Ethical Hacking. Learn to Prevent FACEBOOK , INSTAGRAM hacking!
Rating: 4.1 out of 54.1 (1,581 ratings)
134,259 students
Created by Debayan Dey
Last updated 1/2021
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Transfom your Android Device into an Advance Ethical Hacking Machine
  • Instagram Hacking like pro ATTACKER and make people people aware of such an attack
  • Facebook Hacking like pro ATTACKER and make people people aware of such an attack
  • Any Social Media Hacking as PRO Attacker and make people people aware of such an attack
  • Metasploit Framework
  • Learn how to Use Termux from Scratch
  • PORT Forwarding
  • Clone any Website
  • What is Shell ?
  • BASH Scripting
  • What is F-Droid and its Importance
  • Package Management
  • Learn various CLI commands and use it like a Pro Penetration Tester
  • LAN Attack
  • WAN Attack
  • Learn how to make Persistent Payload
  • Cyber Security Terminology
  • Metasploit Architecture
  • Phishing Attack
  • Run Kali Linux in your Android Device without Root
  • Vulnerability , Exploit , Payload
  • Bind Shell and Reverse Shell
  • PHP Programming
  • Ways to Prevent Cyber Attacks
  • 3 Essential Tools of Encryption and Decryption
  • Learn Encryption and Decryption
  • How to access the Front Camera of the Victim
  • Protect Your files with Passwords
  • Installing PHP and Starting the Server
  • Convert your Phishing Website into an Android App
  • Wifi Password Cracking
  • using of Hackers KeyBoard
  • Social Engineering
  • What is SALT in Cryptography ?

Requirements

  • Android Device
  • Internet
  • No Computer
  • No Laptop
  • Ethical Hacking Mindset
  • zeal to learn
  • Share your learning to your family , friends and everyone you know by making them aware about the cyber Attacks
  • No Illegal Activities

Description


New Annoucement : Course Update for September Month

Hello Everyone !

Welcome to the CAEHP i.e. the Complete Android Ethical Hacking Practical Course .

My name is DEBAYAN DEY and i will be your Instructor for the CAEHP Course.

CAEHP is one of the Most Comprehensive Real World  100%  Hands-On Practical Approach on Android Ethical Hacking...!!!

Now this course is designed for anyone who is interested in learning how an attacker attack and get the information from the victim.

CAEHP is designed by keeping in mind that most of us are not having laptops or computer machine to work for most of the time.  Thats why in this course curriculum , you need not require any laptop or computer system.

Only you need an android device and this entire course is 100% practical based !

isn't this amazing ???

Yess , plus the most important thing , you need not to root your Android device.

waaoo !!! so all in one ,  you just require an android phone and turn it into powerful ethical hacking machine.

Lil brief about my name ,   i am Certified Secure Computer User (CSCU) v2 , and Certified Ethical Hacker (CEH V10) from EC COUNCIL

also i am certified Google IT support from Google , and currently doing  micromaster  in the Field of Cyber Security from Rochester institute of technology (RIT) New York in edx .

here are few of my other accomplishments in the field of cyber security ,

  • Introduction to Cyber Attacks , New York University

  • introduction to Cyber security for business , University of Colorado System

  • Palo Alto Networks academy cybersecurity foundation  , Palo alto networks

  • International cyber conflicts  , The State University of New York

  • Cyber Attacks Countermeasures , New York University

  • Networking ans security Architecture with Vmware NSX

  • Enterprise System Management and security ,University of Colorado System

Rest we'll have a meet and greet section to know other Learners ...!!!

so whats there in this CAEHP COURSE?

First of all i would love to  tell you , that this course is not limited  to time .

You may see 6 or 7 section today , once you land in this course after few weeks , you'll see more sections and videos are added up.  so this is the advantage of taking this course that you'll get regular updates about the new features and attacks and how you , as an individual can prevent yourself  from such an attack.


so currently in CAEHP course  , we have 6 Section + 1 Optional Section and 1 Bonus Section


SECTION  1  :

  • Meet and Greet

  • Introduction of the Section

  • What is Termux ?

  • What is Shell ?

  • Why Termux ?

  • Installation

  • What is F-Droid ?

  • Package Management

  • Q/A Session with instructor  and  various Social Media availability

So , we'll turn our Android device to a complete ethical hacking powerful device by installing termux.


SECTION  2  :

  • Next we'll cover , termux basics by learning various CLI commands.

  • Installing TERMUX from Google Play Store

  • Storage Setup , Update and Upgrade

  • Learn why we use apt

  • hidden files , versions

  • Various Text Editor

  • Learn how to check IP

  • Various other Network Related Commands

  • Learn why we change various modes

  • Learn how to use GIT Repository

  • and much more cool stuffs...!!!!


SECTION  3  :

  • There after we'll cover one of the most powerful tool in penetration testing and ethical hacking , i.e. Metasploit Framework.

  • We'll see  how an attacker create payloads

  • perform LAN   and WAN i.e local area  network and wide area network attacks

  • using port forwarding

  • and how the attacker creates persistent Payload

  • Learn BASH Scripting

  • and how an attackers takes the control of the victims mobile device and get all the data.

  • and much more cool stuffs...!!!

SECTION  4  :

  • next we'll learn what is Encryption

  • what is Decryption

  • how we can encrypt our files

  • how we can Decrypt our files

  • Learn how we can protect our files and folders with passwords

  • so in this section we'll cover installation of 3 very important tools used for Encryption and Decryption in Linux

  • What is SALT in Cyprography ?

  • Further we'll learn how we can perform Encryption and Decryption

  • and much more cool stuffs...!!!

SECTION  5  :

  • most exciting Section

  • Introduction

  • What is Phishing Attack ?

  • We gonna learn  how an attacker do phishing attacks.

  • here we'll mirror any website

  •   We'll also learn how we can clone Facebook , Instagram , twitter or any social media

  • installation of PHP

  • starting of PHP server 

  • Run the Cloned Website in your LocalHost

  • Then uploading  the files online

  • Run the Cloned Website Online

  • Learn Social Engineering

  • Share the link to the Victim and get the Username and the Password once the Victim tries to Login

  • and then creating an app of the cloned website

  • Share the Android App with the victim

  • Again learn how to do Social Engineering so that the Victim downloads the App

  • Get the Username and the Password once the Victim tries to Login from the APP

  • So in this section , we'll see how an attacker sends a link or an app to the victim and once the victim tries to login with login credentials , bang , victims password is with the attacker .

  • and much more cool stuffs...!!!!


SECTION  6  :

  • next section is pretty much interesting

  • we'll see how we can do port forwarding

  • generate an HTTP or HTTPS  url Link

  • how by simply sending a link  an attacker gets complete camera access

  • and receives the photographs after every few interval of time of the victim.

  • Next we'll see how to Uninstall such Dangerous Package

  • We will learn how to stay safe

  • Prevent from getting Hacked

  • Learn how to Aware your Family Members and known person by teaching them how to stay protected

  • and much more cool stuffs...!!!!


OPTIONAL SECTION  :

  • this section named as optioal section , we gonna cover various tools which can be very handy for the rooted android device.

  • Ok so those who are having rooted android device can go through this section.

  • Learn working of  Wifi Network

  • Learn what is AIRCRACK-NG

  • Installation of the package

  • Learn how to use AIRMON-NG

  • and much more cool stuffs to be added up...!!!!


REWARD ( BONUS) SECTION  :

  • and last but not the least  we have bonus section.

  • We'll see how we'll  run kali Linux in our Android device

  • No need to Root your Android Device

  • Apps to install

  • Installation of Kali Linux

  • Learn using SSH Client

  • Turn your Android Device into a Penetration Testing and Ethical Hacking Device

  • and much more cool stuffs to be added up...!!!!


So all the sections will cover Quizzes , Assignments and Reading Materials .

Also , all the sections will be updated on regular basis and new sections will also be added up , so once you are enrolled in the course , you'll surely gonna learn various techniques how attackers attack and how we can safe ourselves from getting attacked.


  • Most importantly , this course is completely for educational purpose


  • all the attacks which an attacker perform  are demonstrated to you so that you understand the technology and the art behind it and you're not fooled by any kind of social engineering.


  • This course is for educational and awareness purpose , to make everyone aware and be safe and protect your data.


  • Its a request , please do not perform any illegal activities , Udemy and me ( Debayan Dey ) is not responsible for  your illegal activities you perform.


so, Welcome to the world of  complete android Ethical hacking  practical course.


Feel Free to Reach out at any point of time , i will be happy to Help you , and if you face any PROBLEM , just post your DOUBTS , you will be Answered within 24hrs to 48hrs of time ..!!!!!


ARE YOU EXCITED to learn 100% complete practical course  and help your family stay secured and safe from data theft and from hackers ?

Wish you all the best...!!!!

See you in the course landing page ....!!!!

Who this course is for:

  • Mobile Hacking
  • Beginners who want to Learn Cyber Security
  • Android Hacking
  • Beginners who are curious about Ethical Hacking
  • Beginner BASH Scripting
  • Learn Phishing Attack
  • PHP Programmers who wants to learn Ethical Hacking
  • Learn Social Engineering and help others by sharing your knowledge and making them aware
  • Metasploit Framework
  • Learning Cryptography

Course content

10 sections • 98 lectures • 6h 3m total length

  • Preview00:00

  • Meet and Greet ...!!!
    2 questions
  • Disclaimer and Note
    00:31
  • 5 Mins Reading Material Before we Start
    00:23
  • Preview01:03
  • Self Test
    5 questions
  • What is Termux ?
    02:51
  • What is Shell ?
    01:02
  • Preview01:59
  • Installation
    00:49
  • what is F-Droid ?
    01:04
  • Package Management
    01:22
  • Preview00:04

  • Rate the Course
    00:13
  • Installing TERMUX from Google Play Store
    02:49
  • Storage Setup , Update and Upgrade Command
    03:56
  • Why we use apt ?
    04:47
  • apt Command in Linux
    02:39
  • Remove Package
    01:30
  • You can also download Hackers Keyboard from Google Play Store
    00:13
  • Package Management Basics: apt, yum, dnf, pkg
    00:48
  • Optional Reading Material for Knowledge : Package Management Systems
    01:15
  • Optional Reading Material : Update Package Lists
    00:18
  • apt-show
    01:37
  • hidden files , versions and CD commands
    02:00
  • Nano and Cat commands
    02:57
  • PWD and touch command
    03:51
  • mkdir command
    01:03
  • use of cd command
    02:27
  • use of mv command
    04:56
  • use of rm command
    02:23
  • mix use of " cp , mv and touch " command
    02:45
  • use of uname command
    01:07
  • use of ifconfig command
    01:52
  • know your IP address
    01:04
  • use of Ping command
    01:12
  • use of "chmod" command
    02:56
  • use of cal and proc command
    03:24
  • Preview03:31
  • Various Other Useful Commands
    00:28

  • Advanced Termux/Linux Commands Learning in the form of Quiz for Knowledge
    6 questions
  • Preview01:49
  • Optional Advanced Understanding of Penetration Testing and its Stages
    02:26
  • Advanced Penetration Testing Questions to give you indepth knowledge
    4 questions
  • What is Metasploit Framework and its History
    02:07
  • Optional Reading Material for Metasploit Framework
    01:37
  • Basic Terminologies " Vulnerability"
    01:37
  • Basic Terminologies " Exploit"
    02:12
  • Basic Terminologies " Payload"
    02:45
  • basic architecture of Metasploit
    01:43
  • Module in Architecture of Metasploit
    02:01
  • What is Shell , Bind Shell , Reverse Shell
    02:09
  • Initial Steps , ways to Prevent these Attacks and Conclusion
    02:26
  • READING Material "What is Social Engineering ? "
    04:44
  • Social Engineering
    10 questions
  • installation of CPU-Z
    01:12
  • Optional Reading Material for CPU-Z
    00:58
  • Metasploit Installation
    14:25
  • Optional Reading Material for Installing the Metasploit in Termux
    00:12
  • alert for Database Server
    00:26
  • Test the Metasploit Framework and learn what is MSFconsole
    04:20
  • Help Command and Banner Command
    01:44
  • Show Command ( no audio )
    03:36
  • Show , Search Info , Use commands
    04:31
  • Metasploit exploit over the LAN explaination
    01:17
  • Reading Material of what is LAN i.e. LOCAL AREA NETWORK
    00:52
  • complete exploit over the LAN
    17:07
  • Reading Material " What is WAN i.e. WIDE AREA NETWORK ? "
    00:33
  • Port Forwarding Demonstration with Data is Turned on along with hotspot (failed)
    11:45
  • Hotspot Failure ( turning OFF again and again )
    08:05
  • Getting confused with the LPORT while we are doing with WIFI
    17:14
  • learning from our mistakes perfectly working this time with wifi ( no audio)
    07:13
  • Making our payload PERSISTENT
    20:07
  • Metasploit Quiz
    4 questions

  • What is encryption and decryption
    02:04
  • Reading Material " Difference between Encryption and Decryption"
    00:48
  • Tool1
    05:16
  • OPTIONAL Reading Material "The Rijndael Encryption Algorithm"
    03:48
  • Tool2
    06:09
  • OPTIONAL Reading Material "pkzip stream cipher algorithm"
    00:30
  • Tool3 and what is "salt" explained
    06:46
  • Tool3 Continued "decryption"
    02:29
  • OPTIONAL Reading Material "AES Algorithm"
    01:26

  • Preview03:04
  • What is Phishing Attack ?
    02:35
  • Mirroring Website
    08:36
  • Installing PHP and starting the Server in localhost with port number
    05:54
  • Generated the password in localhost
    13:21
  • Uploading files in webhosting platform
    09:25
  • Convert your website to an Android APP
    08:38
  • Advanced Phishing Attack Questions
    8 questions

  • Know the Tool which attackers use to access the Camera
    02:23
  • OPTIONAL READING Material
    00:49
  • if SAYCHEESE is not cloning , try this one !
    00:29
  • How to perform the attack
    09:50
  • How to uninstall the Tool
    02:09

  • 1. what is **** ( Tool Name ) and its Cloning from GitHub
    04:44
  • 2 changing the TOOL to full executable mode
    02:30
  • Attempt with Option 1 and its a Success
    11:23
  • Attempt with Option 2 and its again a Success
    11:06
  • Optional
    00:09

  • Crack wifi password with rooted android device
    15:37
  • Optional Quiz
    1 question

  • Learn how to install Kali Linux in non rooted android device
    09:10
  • Preview00:05
  • Learn Augmented Reality In Depth
    00:03

Instructor

Debayan Dey
AR Developer , Cyber Security Enthusiast , DJI Drone Pilot
Debayan Dey
  • 4.2 Instructor Rating
  • 2,148 Reviews
  • 180,152 Students
  • 3 Courses

Hi everyone ! My name is Debayan Dey.  I have been working with Unity 3D and Vuforia from couple of years and made many 2D , 3D , Multiplayers games along with Augmented Reality Apps. I am certified Google IT Support Engineer , CEH v10 , CSCU v2 , DJI Drone Pilot , Photographer . I also love Travelling and have a travel blogging page in Instagram Named as " thenewagetraveller ". I also run my Youtube Channel  ( Link is shared in  Bio ). Avid Dream chaser who loves to follow his passion.


More than 20,000+ students from 150+ countries have taken my courses.

Just Be Patient.... soon I would be uploading some more interesting courses on programming,online marketing,designing,hacking, e.t.c.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.