The Road to Ethical Hacking - Beginner to Expert!: 3-in-1
4.2 (10 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
81 students enrolled

The Road to Ethical Hacking - Beginner to Expert!: 3-in-1

A Step by Step Guide to learn the latest Ethical Hacking Concepts and clear Ethical Hacking Examination!
4.2 (10 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
81 students enrolled
Created by Packt Publishing
Last updated 11/2018
English
English [Auto-generated]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 15 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Work with the Metasploit toolkit to test the effectiveness of defenses.
  • Incorporate sniffing with the Man-in-the-Middle attack.
  • Bypass modern security defenses to understand the ins and outs of security.
  • Learn Network Pentesting Steps and gather Network Based Vulnerabilities Details
  • Work with websites and web Scanning Process to tackle attacks on Network Devices
  • Learn latest website based attack e.g. - SQL injection, XSS attack, csrf attack etc and ways to tackle them.
  • Prevent Brute Force Attack, Shell upload Attack, Buffer Overflow Attack Learning latest Android Based Vulnerabilities and way to exploit them Practicing questions to crack Global Ethical hacking Exam.
Requirements
  • Prior knowledge of Kali Linux and its concepts will be useful (Not Mandatory).
Description

Cyber threats are on the increase with the rising growth of technology, thus giving rise to the need for ethical hacking and advanced security. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. Security is the foremost concern for all organizations both big and small, and thus companies and people are ready to invest in enhanced security, pentesting, and Ethical Hacking.

This comprehensive 3-in-1 course is a comprehensive course full of the latest and most important tools for you to be a master in the Ethical Hacking world! You’ll begin to work with the Metasploit toolkit to test the effectiveness of defenses. You’ll then use Kali Linux for information gathering, vulnerability assessment, exploitation, password cracking, and network sniffing and spoofing. Finally, you’ll learn Network pentesting, Website pentesting, Android pentesting as well as prepare for Ethical Hacking exam!

By the end of the course, you’ll hack your way to a secure and threat-free environment using best-in-class tools and techniques with Kali Linux!

Contents and Overview

This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.

The first course, Ethical Hacking for Beginners, covers hacking your way to a secure and threat-free environment using best-in-class tools and techniques. We'll begin by introducing you to the best tools around; these are essential to get you started with penetration testing. Next, we'll introduce you to a basic hacking technique: reconnaissance. You'll get hands-on experience working with Metasploit and testing the effectiveness of different defenses. Next, you'll learn about sniffing and how effective the Man-in-the-Middle attack can be. We'll take you through a coffee shop scenario to further your understanding. You'll get the hang of bypassing different defenses, then learn how hackers use networks to gain access to different systems.

The second course, Mastering Ethical Hacking, covers Take your organization’s system security to the next level using Kali Linux. This course takes your Ethical Hacking skills to the next level to help you address various security threats, whether in information, networks, and other security concerns. This course will start by showing you how to install Kali Linux on your system and how to work with it. The course will then show you how to gather information using different methods such as fingerprinting and open ports. The course will then help you check your system's vulnerability using Nessus and OpenVAS. You will then learn to exploit your vulnerability with different parameters to reveal all the gaps in your system. You'll then escalate privileges in your system to improve your design and program and prevent password attacks using different methods. Finally, you will learn to prevent wireless attacks on your system. By the end of the course, you will be a Master of Ethical Hacking and will have learned to prevent unwanted hackers from hacking into your system.

The third course, Ethical Hacking Masterclass, is your certification guide to ethical hacking. Security is the foremost concern for all organizations both big and small. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. This action-packed course provides information on all the latest hacking tools in one place. You'll learn all the latest tools and features such as network pentesting, website pentesting, and Android pentesting. By the end of the course, you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker.

By the end of the course, you’ll hack your way to a secure and threat-free environment using best-in-class tools and techniques with Kali Linux!

About the Authors

  • Gary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome's Computer Security and Forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats. He is also the author of the video course: Ethical Hacking for Beginners.

  • Sunil Gupta. He is a Certified Ethical Hacker. Currently, he teaches 50,000+ students online in 150+ countries. He is a specialist in the Ethical Hacking and Cyber Security areas.
    Author strengths –
    Vulnerability assessment
    Penetration testing
    Intrusion detection
    Risk identification
    Data analysis
    Reporting and briefing.

  • Alexis Ahmed is an experienced Ethical Hacker and Cyber Security Expert with over 5 years' experience, He also develops Android apps and games in his free time. In addition, he is also a Web Developer with over 4 years' experience and he loves creating beautiful and functional websites for clients all over the world. He has a YouTube channel with over 19,000 subscribers and more than 1 million views where he makes videos on Ethical Hacking, Linux, and programming.

Who this course is for:
  • Ethical Hackers, Penetration Testers, Network Administrators, Cyber Security Specialists, or IT Security Professionals who want to take their Ethical Hacking skills to the next level to defense against the dark arts!
Course content
Expand all 125 lectures 15:02:04
+ Ethical Hacking for Beginners
14 lectures 02:03:02

This video provides an overview of the entire content.

Preview 02:56

The goal of this video is, as the title of the video suggests, getting familiar to the basic terminologies used in hacking.

  • Get a grasp on the definitions of the hacking terms used in this course

  • Understand their significance

  • Know the phases of ethical hacking

Basic Terminologies
05:41

In this video, we will take a look at the operating systems used in this course.

  • Check out the operating system used in the course

  • Glance through some of the tools we have used in the course

Operating Systems and Tools Used
01:52

The goal of this video is to get an overview of the first step of ethical hacking: Reconnaissance.

  • Understand the importance of the Reconnaissance phase in hacking

  • Know more about Passive and Active foot printing

  • Take a deeper look at Vulnerability Research

What is Reconnaissance?
06:34

Our aim in this video is to understand what NMap is and how we will be working with it.

  • Understand the 3-way TCP handshake

  • Talk about ports, switches, and options

  • Use the commands we learnt in demo scenarios

Working with NMap
13:47

In this video we will learn what Shodan is and how to use it.

  • Scour through the Shodan website

  • Explore the options available on the website

  • Create a demo report

Shodan for scanning
07:23

In this video we’ll understand vulnerability scanning

  • Check out vulnerability scanning with Nikto

  • Check out vulnerability scanning with Sparta

Other Types of Reconnaissance
14:56

Used by industry leaders in security, Metasploit is essential to a hacking course for beginners. Let’s talk about it in this video.

  • Know what Metasploit is

  • Understand the basic commands used in Metasploit

Metasploit Basics
11:39

This video will help us understand how we can effectively exploit the weakness in a system

  • Know how to find vulnerabilities in a system

  • Launch exploits to penetrate a target

Exploiting a Vulnerability
08:31

This video will help us understand armitage in detail.

  • Understand what armitage is

  • Know how to effectively use armitage

Armitage
12:58

In this video we will take a look at Aircrack-ng that will help us in wireless hacking.

  • Understand what aircrack-ng is

  • Use aircrack-ng to crack WEP encrypted WiFi

Aircrack-ng
05:43

The goal in this video is get a grasp over MitM (Man-in-the-Middle) Attacks.

  • Understand what a MitM (Man-in-the-Middle) Attack is

  • Get to know how to run a MitM (Man-in-the-Middle) Attack

MitM (Man-in-the-Middle) Attack
08:03

Our aim in the video is to know how to use the Social Engineering Toolkit.

  • Understand what Social Engineering is

  • Know how to effectively use a Social Engineering Toolkit

Social Engineering Toolkit
11:20

This video will help us understand the working details of Wireshark.

  • Understand what Wireshark is

  • Know how to effectively use Wireshark

Working with Wireshark
11:39
+ Mastering Ethical Hacking
34 lectures 05:40:33

This video will give you an overview about the course.

Preview 09:16

In this video, learn how to download the appropriate version of Kali Linux depending on your system architecture and hardware specifications.

  • Visit the Kali website

  • Select the correct version

  • Download via torrent or direct download

Downloading Kali Linux
05:56

In this video, learn how to download and install the latest version of VMware.

  • Visit the VMware website

  • Select the free version of VMware

  • Install VMware

Downloading and Installing VMware
05:28

In this video, learn how to download and install the latest version of VirtualBox.

  • Visit VirtualBox website

  • Select the correct version according to your platform

  • Install VirtualBox

Downloading and Installing VirtualBox
04:51

In this video, learn how to install Kali Linux on VMware.

  • Create the virtual machine

  • Start the setup process

  • Install Kali Linux

Installing Kali Linux
17:51

In this video, we will learn how to install VMware tools on Kali Linux.

  • Insert VMware additions

  • Copy and extract VMware tools to desktop

  • Install from terminal

Installing VMware Tools
11:51

In this video, we will learn how to update Kali Linux with the aptitude package manager.

  • Update repository

  • Update packages

  • Update distribution

Updating Kali Linux
04:54

In this video, we will learn how to setup and configure Proxychains for anonymity.

  • Install the tor service

  • Edit the Proxychains configuration file

  • Start the tor service and launch Proxychains

Setting Up Proxychains
09:12

In this video, we will learn how to start and stop network services on Kali Linux.

  • Start apache service

  • Start SSH service

  • Connect to Kali Linux via SSH

Starting Network Services
05:58

In this video, we will learn how to gather DNS information on the target with dnsenum.

  • Select the target

  • Scan target with dnsenum

  • Analyze results

DNS Enumeration
09:59

In this video, we will learn how to perform a Whois lookup on a target and how to enumerate subdomains.

  • Perform Whois lookup

  • Configure Knockpy

  • Enumerate Subdomains

Information Gathering – Whois Lookup and Subdomain Enumeration
10:45

In this video, we will learn how to scan a target for open ports with Nmap.

  • Learn Nmap syntax

  • Perform the Nmap scan

  • Explore port states – Open, closed, or filtered

Finding Open Ports with Nmap
07:03

In this video, we will learn how to perform OS and service fingerprinting with Nmap.

  • Learn Nmap syntax

  • Perform Nmap scan

  • Study OS and service detection and analysis

OS and Service Fingerprinting
07:10

In this video, we will learn how to use Maltego for information gathering.

  • Configure Maltego

  • Study overview of the interface

  • Explore information gathering

Exploring Maltego
11:33

Buttons appear all over a site (Go Premium, Learn More, Submit, and so on) and usually have the same general style but vary in things such as color, width, and position. Creating modular lightweight classes to handle this variation can be very efficient.

  • Registration and download

  • Install Nessus

  • Configure Nessus

Installing and Configuring Nessus
11:24

In this video, we will learn how to scan for local vulnerabilities with Nessus.

  • Overview of the interface

  • Create a policy and scanning

  • Analyze results

Finding Local Vulnerabilities Using Nessus
16:30

In this video, we will learn how to scan for vulnerabilities on Linux.

  • Create Policies

  • Create scans

  • Perform scanning and analyzin results

Checking for Linux Specific Vulnerabilities with Nessus
10:59

In this video, we will learn how to scan for vulnerabilities on Windows.

  • Create Policies

  • Create scans

  • Perform scanning and analyzing results

Checking for Windows Specific Vulnerabilities with Nessus
08:05

In this video, we will learn how to download, install and configure OpenVAS on Kali Linux.

  • Downloading OpenVAS

  • Install OpenVAS

  • Start the OpenVAS service

Installing and Configuring OpenVAS
05:20

In this video, we will learn how to scan for vulnerabilities on Linux and Windows.

  • Study overview of the interface

  • Create scan configurations

  • Explore Information gathering

Checking for Linux and Windows Vulnerabilities with OpenVAS
21:49

In this video, we will learn how to use the Metasploit console for basic exploitation.

  • Start the Metasploit console

  • Use modules for exploitation

  • Exploit a vulnerability

Mastering Metasploit – Metasploit Console MSFconsole
18:07

In this video, we will learn how to use Armitage for exploitation.

  • Start Armitage

  • Overview of the interface

  • Scan a target and exploitation

Exploring Armitage – The Metasploit Graphical User Interface
17:27

In this video, we will learn how to exploit a MySQL database running on a server.

  • Select the module

  • Set the options

  • Learn about Exploitation and enumeration

MySQL Database Exploitation with Metasploit
08:42

In this video, we will learn how to use the BeEF Web Interface for browser exploitation.

  • Start the BeEF Services

  • Go through an overview of the interface

  • Hook the client browser and exploitation with modules

Client Side Attacks – BeEF Browser Exploitation
17:51

In this video, we will learn how to use the SET for credential harvesting attack on a target.

  • Understand the attack vector

  • Clone a site

  • Get the target to click on the link and stealing credentials

Client Side Attacks – Using the Social Engineering Toolkit (SET)
Processing..

In this video, we will learn how to generate custom wordlists with crunch.

  • Understand the crunch syntax

  • Understand the characters set combination

  • Generate a wordlist

Generating Wordlists with Crunch
11:05

In this video, we will learn Cracking Linux and RAR/ZIP passwords with John the ripper.

  • Understand the syntax

  • Crack Linux passwords

  • Crack RAR/ZIP Passwords

Password Cracking with John the Ripper
11:59

In this video, we will learn how to crack online log ins with Hydra.

  • Learn the syntax

  • Use default wordlists

  • Explore the SSH exploitation with Hydra

Password Cracking with Hydra
08:25

In this video, we will learn how to crack online log ins with Medusa.

  • Learn the syntax

  • Use wordlist and usernames

  • Learn about Exploitation with Medusa

Password Cracking with Medusa
08:02

In this video, we will learn how to discover devices on your network with netdiscover.

  • Understand the syntax

  • Scan your network

  • Analyze the results

Network Discovery with Netdiscover
10:10

In this video, we will learn how to sniff packets on your network with Tcpdump.

  • Understand the syntax

  • Sniff packets from a target

  • Sniff specific packets with filters

Network Sniffing with Tcpdump
10:43

In this video, we will learn how to sniff packets on your network with Wireshark.

  • Overview of the interface

  • Use protocol filters

  • Use IP filters

Network Sniffing with Wireshark
09:36

In this video, we will learn how to perform MITM attacks with arpspoof.

  • Understand Spoofing

  • Allow the flow of packets

  • Use arpspoof for MITM attack

ARP Spoofing with arpspoof
06:39

In this video, we will learn how to use Ettercap for MITM attack.

  • Start Ettercap

  • Select the interface and starting the sniffing

  • Select your target IP and traffic sniffing with Wireshark

MITM with Ettercap
05:53
Test Your Knowledge
4 questions
+ Ethical Hacking Masterclass
77 lectures 07:18:29

This video provides an overview of the entire course.

Preview 03:17

This video provides a detailed information about the course.

  • Explain about course topics

  • Discuss various components

  • Prepare for next sections

Course Overview – How to Get the Most Out of This Course?
02:30

In this video, we will look at some basic examples of pentesting.

  • Look at antivirus info

  • Discuss in detail about bypass antivirus

  • Exploit Windows

Teaser – Bypass Antivirus in Windows 10 and Hack Windows 10 Completely
10:28

In this video, we will look at different terms in ethical hacking.

  • Discuss basic terminologies related to ethical hacking

  • Explain different terminologies in ethical hacking

  • Difference between different ethical hacking terminologies

Ethical Hacking – Latest Terminologies
03:02

This video focuses on the Installation Process of VMware.

  • Explore VMware

  • Download VMware

  • Installation of VMware

Download and Install VMware Workstation
03:47

In this video, you will learn to download Windows 10 and Kali.

  • Learn how to download Kali Linux

  • Learn how to download Windows 10

  • Explore Kali Linux

Download Windows 10 and Kali Linux 2018
05:17

This video focuses on the installation of Operating Systems.

  • Learn about the installation process

  • Explore Windows installation

  • Learn about Kali Linux installation

Installation of Windows 10 and Kali Linux in VMware Workstation
04:47

In this video, you will learn how to update and upgrade process.

  • Explore the upgrade process

  • Understand the update process

  • Learn how to upgrade process

Update and Upgrade the Kali Linux Operating System
04:04

This video focuses on pentesting overview.

  • Explore pentesting

  • Understand yarious pentesting techniques

  • Explanation

What Is Network Pentesting?
03:37

This video will help you explore components of pentesting.

  • Learn about the components of pentesting

  • Get in-depth understanding of the components

  • Explanation

Various Components of Network Pentesting
03:30

In this video, you will learn about scanning network.

  • Explore Ip scanners

  • Scan Ip Address

  • Explanation

IP Scanners in Network
06:12

This video focuses on Port Scanning.

  • Explore port Scanning

  • Learn about Nmap Info

  • Scan using nmap

Port Scanning in Network Using Nmap
06:00

In this video, you will learn about Nessus installation.

  • Explore the installation process of Nessus

  • Download process

  • Installation process

Nessus Installation
06:18

This video focuses on the scanning using Nessus.

  • Explore process of setup

  • Scan Ip Address

  • Explanation

Vulnerability Scanning Using Nessus
06:03

This video focuses on various AV bypass Frameworks.

  • Explore AV Bypass mechanism

  • Download Frameworks

  • Installation

Installation of Antivirus Bypass Frameworks
10:21

In this video, you will learn about Bypass Defender and Pentest Windows10.

  • Explore lab setup

  • Understand Bypass Defender

  • Learn about Windows10 Pentesting

Bypass Windows 10 Defender and Hack Windows 10 from Kali Linux
07:52

This video focuses Bypass AV and pentest Windows 10.

  • Lab setup

  • Explore bypass AV

  • Understand Windows 10 Pentesting

Bypass Windows 10 Antivirus and Hack Windows 10 from Kali Linux
13:00

In this video, you will learn about meterpreter commands.

  • Setup lab

  • Explore meterpreter commands

  • Explanation

Various Meterpreter Commands
07:27

In this video, you will learn about router Pentesting.

  • Overview of Router Pentesting

  • Scenario

  • Explanation

About Router Pentesting
03:56

This video will help you download and Install Router.

  • Explore VyOS

  • Download VyOS

  • VyOS Installation

Download and Install VyOS on a VMware Workstation (Virtual Router)
06:10

This video focuses on services in router.

  • Explore services in router

  • Start the services

Start Services in Router
07:31

In this video, you will learn about brute force attack.

  • Explore brute force attack

  • Brute force using Hydra

  • Brute force using Medusa

Password Cracking (Brute Forcing) Using the Hydra and Medusa Tools
10:16

This video focuses on MITM Attack.

  • Learn about MITM

  • Scenario

  • Explanation

Man-in-the-Middle Attack Overview
02:25

In this video, you will learn about MITM using tools.

  • Explore the Tools to perform MITM

  • MITM attack using Wireshark

  • MITM using Ettercap

Man-in-the-Middle Attack (MITM) Using Wireshark and Ettercap
06:52

This video focuses on Social Engineering Attack.

  • Explore social engineering attack

  • Scenario

  • Explanation

Social Engineering Attack Overview
02:43

In this video, you will learn about pentesting using SET.

  • Social engineering lab setup

  • Perform practical

  • Explanation

Social Engineering Attack Using Social Engineering Toolkit
05:18

This video focuses on Beef framework.

  • Explore Beef framework

  • Scenario

  • Explanation

About the Browser Exploitation Framework
03:05

In this video, you will learn about Pentesting using BEEf.

  • Setup the Lab

  • Browser exploitation

  • Explanation

Browser Exploitation Attack Using BeEF
06:34

In this video, we will learn about Xampp installation.

  • Explore Xampp

  • Download Xampp

  • Installation of Xampp

Download and Install Xampp Server in Kali Linux
07:41

This video focuses on host Buggy application.

  • Expore Mutillidae

  • Download Mutillidae

  • Host Mutillidae

Download and Install a Buggy Web Application
05:13

In this video, you will learn about website Information.

  • Explore Website information

  • Scenario

  • Explanation

Website Introduction
02:31

In this video, you will learn about website Pentesting.

  • Explore Web Pentesting

  • Scenario

  • Explanation

Website Pentesting Overview
03:58

In this video, we will learn about Acunetix scanning.

  • Explore Acunetix

  • Download and installation of Acunetix

  • Scanning using Acunetix

Acunetix Web Vulnerability Scanner
07:44

This video focuses on Burpsuite scanning.

  • Explore Burpsuie

  • Scan using Burpsuite

  • Explanation

Burp Suite Community Edition
07:31

This video will help you understand ZAP scanning.

  • Explore ZAP scanning

  • Scan using ZAP

  • Explanation

Zed Attack Proxy Tool (ZAP)
07:22

In this video, you will learn about report analysis.

  • Explore report analysis

  • Creation of report

  • Analysis of report

Report Creation and Analysis
06:37

In this video, you will learn about SQL injection attack overview.

  • Explore SQL injection

  • Scenario

  • Explanation

SQL Injection Attack Overview
02:48

In this video, you will explore SQL injection attack.

  • Lab setup

  • Process of SQL attack

  • Explanation

SQL Injection Attack on a Buggy Web Application
06:33

This video will help you understand HTML injection attack

  • Explore HTML injection

  • Understand the process of HTML injection

  • Explanation

HTML Injection Attack on a Buggy Web Application
06:23

In this video, you will learn about SQL attack on website.

  • Learn from the basic scenario

  • Use of Sqlmap

  • Attack on a live website

SQL Injection on a Live Website Using Sqlmap Kali Linux
09:56

In this video, you will learn about XSS attack.

  • Explore XSS attack

  • Learn about various types of attacks

  • Explanation

About XSS Attack and Types
02:38

This video focuses on persistent XSS.

  • Explore persistent XSS

  • Lab setup

  • Perform XSS attack

Persistent XSS Attack on a Buggy Web Application
06:43

In this video, you will learn about non – persistent XSS.

  • Explore Non-persistent XSS

  • Lab setup

  • Perform XSS attack

Non-Persistent XSS Attack on a Buggy Web Application
05:10

This video will help you learn DOM based attack.

  • Explore DOM based attack

  • Lab setup

  • Perform DOM based attack

DOM-Based XSS Attack
03:21

In this video, you will get a brief CSRF attack overview.

  • Learn about CSRF attack

  • Scenario

  • Explanation

About CSRF Attacks
03:26

This video focuses on CSRF attack.

  • Lab setup

  • Perform CSRF attack

  • Explanation

CSRF Attack on a Buggy Web Application
08:54

In this video, learn about Shell upload attack.

  • Explore shell upload attack

  • Perform Shell upload attack

  • Explanation

Shell Upload Attack on a Buggy Web Application
06:41

This video focuses on buffer overflow attack.

  • Learn about buffer overflow attack

  • Perform buffer overflow attack

  • Explanation

Buffer Overflow Attack on a Web Application
05:16

This video focuses on brute force attack.

  • Explore brute force attack

  • Perform brute force attack

  • Explanation

Brute-Force Attack on the Login Panel of a Web Application
08:45

In this video, you will learn about local file inclusion.

  • Explore local file inclusion

  • Perform Local file inclusion

  • Explanation

Local File Inclusion Attack on a Web Application
07:47

This video focuses on Android Studio installation.

  • Explore Android Studio

  • Download Android Studio

  • Installation of Android Studio

Download and Install Android Studio
06:05

In this video, you will learn about the Android phone setup.

  • Lab Setup

  • Start emulator

  • Start Android phone

Start Android Phone in Android Studio
05:16

This video focuses on the Installation learner APP.

  • Explore APK files

  • Download APK

  • Installation APK

Download and Install APK File in Android Phone
06:21

In this video, you will get a brief Android Pentesting Overview.

  • Explore Android Pentesting

  • Scenario

  • Explanation

About Android Pentesting
02:57

This video focuses on the scope of Pentesting.

  • Explore Pentesting scope

  • Explanation

Scope of Android Pentesting
03:22

This video will give you a brief overview on Log Files.

  • Explore Log Files

  • Scenario

  • Explanation

About Android Log Files
04:29

In this video, you will learn about Task.

  • Task overview

  • Basic info about Task

  • Goal of Task

Information About Task
03:39

This video will focus on log files using Logcat.

  • Use of adb

  • Logcat Info

  • Explanation

Open Log Files Using Logcat
05:06

This video will focus secret information.

  • Explore open log files

  • Analyse log file

  • Find sensitive Info

Analyze Log Files and Find Secret Code
05:19

This video will give you a brief overview on reverse engineering.

  • Explore reverse engineering

  • Scenario

  • Explanation

About the Reverse Engineering Process in Android
04:17

In this video, you will learn about task.

  • Task Overview

  • Basic Info about Task

  • Goal of Task

Information About Task
02:52

This video focuses on the Installation of dex2jar.

  • About dex2jar

  • Download dex2jar

  • Convert apk to jar

Download and Install the Dex2jar Tool
06:23

This video will help you Run JD-Gui.

  • About JD-Gui

  • Download JD-Gui

  • Open source code

Download and Install the JD-Gui Tool
06:20

In this video, we will look in detail about the encryption process.

  • About encryption

  • Discuss the different scenario in encryption process

  • Explain the encryption process

Encryption Process in Android
04:04

This video provides information about Task.

  • Discuss the entire task overview

  • Look at the basic information related to the task

  • Goal of Task

Information About Task
03:31

In this video, we will look at analysing the code and find encryption algorithm.

  • Look at open source code

  • Analyse the code file

  • Find Encryption Algorithm

Analyze the Code and Find the Encryption Algorithm
04:09

In this video we will complete task.

  • Convert String according to algorithm

  • Look at some scenario related to the task

  • Explain the entire process need to followed to complete a task

Complete the Task
05:51

In this video, you will learn about SQL injection attack.

  • Explore SQL injection attack

  • Scenario

  • Explanation

About SQL Injection Attack on Android
04:32

This video focuses on installation of Drozer.

  • Download Drozer and Drozer.apk

  • Installation of Drozer

  • Installation of Drozer.apk

Download and Install Drozer and Drozer-Agent.apk
07:33

This video will help you understand various Drozer commands.

  • Explore drozer commands

  • Use drozer commands

  • Explanation

Drozer Commands
07:34

This video will help you learn about SQL injection attack using Drozer.

  • Explore SQL injection commands

  • Gather sensitive information

  • Explanation

Perform an SQL Injection Attack on Android Using Drozer
06:09

This video will help you get an overview on Ethical Hacking exam.

  • Explore Ethical Hacking Exam

  • Preparation steps

  • Explanation

Overview of Major Ethical Hacking Exams
02:20

Exam questions part 1.

  • Various exam questions

  • Question’s answers

  • Explanation

Ethical Hacking Exam Practice Questions – Part 1 (MCQ)
08:38

Exam questions part 2.

  • Various exam questions

  • Question’s answers

  • Explanation

Ethical Hacking Exam Practice Questions – Part 2 (MCQ)
06:41

Exam questions part 3.

  • Various exam questions

  • Question’s answers

  • Explanation

Ethical Hacking Exam Practice Questions – Part 3 (MCQ)
05:28

Exam questions part 4.

  • Various exam questions

  • Question’s answers

  • Explanation

Ethical Hacking Exam Practice Questions – Part 4 (MCQ)
07:00

Exam questions part 5.

  • Various exam questions

  • Question’s answers

  • Explanation

Ethical Hacking Exam Practice Questions – Part 5 (MCQ)
07:13
Test Your Knowledge
3 questions