Ethical password hacking and protecting

This Video tutorial helps you to learn different password hacks and protecting methods.
3.6 (461 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
22,410 students enrolled
$19
$200
90% off
Take This Course
  • Lectures 72
  • Length 4 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 9/2015 English

Course Description

Last updated on 27-02-2016

"Course is great, in the guessing section, you almost knew my password, immediately changed it to 23 letters, I am very careful now with it, thanks!" - Ziad Ahmed Amer

"I have taken this course twice because there is so much valuable information. I was not aware that hacking software is available by Googling it. I found this to be very disturbing, however, I am grateful that this course is available to educate us on the software that is available to anyone. My gratefulness is extended due to the counter measures that are provided. Numerous scams are exposed for unsuspecting victims of phishing and hacking. Take advantage of this course so that you can be better prepared and secure. The content is informative, and the quality of the production met my expectations." - Matt Hayes

"This course is packed with great information. Very clear and easy to understand, and all directly to the point, no filler or fluff! Job well Done!" - Don Nir

Ethical Password hacking and protecting is an video tutorial which helps you to learn different password hacks and protecting methods. Videos in this course demonstrate hacking and protecting WiFi and many other password protected accounts using keylogger, guessing, brute force, phishing, social engineering methods and counter measure for each of them.

It's a beneficial course to learn different password hacking methods and to protect your password protected accounts from hackers. All methods are pretty well explained and demonstrated step by step in all videos. It's crash course in ethical hacking. It's a very delightful course to hacking enthusiast's.

How to use:

Watch all videos in full screen and land slide view. Internet connection more than 30kbps is necessary to stream all videos properly. If any technical difficulty appears report to instructor through message option. Any doubts, clarification or suggestion on improvement of course message instructor or post in discussion before giving any bad review.

Disclaimer :

This course is meant for education purpose only, we aren't responsible of implementation of any hack learnt in it, this course is made with vision to create awareness on hacks. As most of the people are suffering from lack of awareness.

What are the requirements?

  • Laptop
  • Internet connection

What am I going to get from this course?

  • To know 5 different password hacking methods and it's counter measures
  • Create awareness on data stealing and hacking in IT firms
  • Protect your online password protected accounts

What is the target audience?

  • Hacking Enthusiasts
  • Students who are interested to pursue career in security
  • Internet entrepreneurs worried about their security

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Disclaimer
Preview
00:40
How to take this course
Preview
01:29
Section 1: Keylogger
00:41

In keylogging or RATing the hacker sends keylogger or rat to the victim.

This allows hacker to monitor every thing victim do on his computer.

Every keystroke is logged including passwords. In this tutorial we will demonstrate

different key logger software for windows, android, mac and iphone and we will explain

the counter measure to avoid your password being hacked.

03:28

use this link to download https://drive.google.com/file/d/0B04Rxwy3-APWT2ZMQVJhS0twZms/view?usp=sharing

01:42

In this video we mentioned keylogger software for mac, windows, Android os, iOS.

02:36

In this video we demonstrate about WhatsApp hacking through mspy app.

hacking whatsapp is demonstrated in this video anyone can follow it and can hack anyone's whatsapp account on android, i Phone, Blacberry, wondows phone etc.

09:28

In this video we show how to purchase mspy app and install in victim device.

01:21

In this video we demonstrated and examine result after few hours on the victim device through mspy app.

01:49
In this video we show you how to deactivate/cancel subscription of mspy app.
03:58

In this video we demonstrate rooting android device to install mspy app.

Whatsapp hacking hands on
2 questions
01:09

In this video we demonstrate you how to find and remove hidden keyloggers in your PC/windows OS.

02:44

In this video we demonstrate you how to find and remove hidden keyloggers in your android OS/phones

01:55

In this video we demonstrate you how to find and remove hidden keyloggers in your mac OS.

Section 2: Guessing
00:28

Guessing password is the most simple and efficient

way to hack any account

We will see list of most common password used across the world,

few tricks and technique to guess password

and finally

we will hack Facebook account by guessing and brute force without getting blocked

We will also see counter measures to avoid it

01:58

In this video we show Guessing the common passwords for hacking password.

01:53
In this video we explain what is minimum requirement for brute force and phishing
Introduction to Kali Linux
06:39
01:27

In this video facebook user account is hacked using guessing and brute force.


00:59

In this video we will see counter measures for guessing passwords.

Guessing
1 question
Section 3: Brute force
00:32

Brute force cracking is a trial and error method used by application to decode password

through exhaustive effort rather than employing intellectual strategies.

brute force cracking application proceeds through all possible combinations

of legal characters in sequence, In this tutorial we will demonstrate you software's used for

Brute force cracking by cracking actual password and we will explain the counter measure to avoid

your password being cracked.

01:53

In this video we will see what we need for brute force and phishing.

01:54
In this video we will see where not to use Virtual box
02:20

In this video we demonstrate you hacking wifi network using brute force technique.

how to crack WiFi password is demonstrated in this video using kali linux.

06:18

In this video we demonstrate you hacking wifi network using brute force technique

in depth.

01:27

In this video facebook user account is hacked using guessing and brute force

08:41
In this video we will see setting up of kali linux in virtual box
03:45

In this video we will see setting up DVWA

05:33

In this video we will see setting up DVWA

02:53

In this video we will see Introduction to hydra

15:10

In this video we will see Hydra collecting information

04:49

In this video we will see Using hydra to brute force

02:20

In this video we will see List of password

02:39

In this video we demonstrate you how to brute force WiFi using smart phone.

Download CJ Brutus: bruteforce WIFI APK

http://mobile9apk.com/Download_CJ-Brutus-bruteforce-WIFI_APK.html


https://drive.google.com/file/d/0B04Rxwy3-APWcmFvOElxd2VHcW8/view?usp=sharing

03:52

In this video we will see how to L0pht crack download and install

10:16

In this video we will see L0pht crack wizard

02:23

In this video we will see how to protect WiFi and facebook account from brute force.

Brute force
4 questions
Section 4: Phishing
00:29

phishing

The act of sending an email to a user falsely claiming to be an established legitimate enterprise in

an attempt to scam the user into surrendering private information that will be used for identity theft.

Phishing email will direct the user to visit a website where they are asked to update personal information,

such as a password, credit card, social security, or bank account numbers, that the legitimate organization

already has. The website, however, is bogus and set up only to steal the information the user enters on the page.

01:53

In this video we show what we need for brute force and phishing.

03:50

In this video we show how to hack facebook acount password using phishing.

how to hack a facebook account password online through phishing is demonstrated in this video.

02:18

In this video we show what thing we should know/do while cloning login page.

01:25

In this video we demonstrate about login page of any website can be cloned or not?

02:56

In this video we will learn to use domain name for phishing.

01:14

In this video we will learn to use domain name for phishing.

03:05

https://drive.google.com/file/d/0B04Rxwy3-APWVUJNMVlCaUF0OTQ/view?usp=sharing

In this video we show how to develop facebook phishing page.

02:55

In this video we show how to host facebook phishing page.

02:34

In this video we demonstrate facebook phishing page in depth and explanation.

02:41

In this video we show that how to Attach phishing page to domain.

01:34

In this video we will see plan of google AdWords for phishing.

02:47

In this video we will demonstrate setting up AdWord account.

02:12

In this video we will see AdWord account in brief.

01:26

In this video we will see keyword.

02:16

In this video we will see keyword match type.

02:29

In this video we will see keyword planner.

04:09

In this video we will see creating campaign.

01:41

In this video we will see result using google AdWords for phishing.

02:56

In this video we will see Budget

03:49

In this video we will see the summary for google AdWords for phishing.

06:44

you can add many things in it like

buying email id

the way those phishing email are written

again say mechanism

00:37

In this video we will see counter measures for phishing.

Phishing
2 questions
Section 5: Social Engineering
01:20

Social engineering is the art of manipulating people so they give up confidential information.

The types of information these criminals are seeking can vary, but when individuals are targeted

the criminals are usually trying to trick you into giving them your passwords or bank information,

or access your computer to secretly install malicious software–that will give them access to your

passwords and bank information as well as giving them control over your computer.

05:47

In this video we will see Social engineering through human method.

04:56

In this video we will see Social engineering through computer method.

01:30

In this video we will see counter measures for Social engineering.

Section 6: Miscellaneous
09:32

In this video we will see SQL Injection

06:43

In this video we will see how to hack Windows 7 Metasploit using Kali Linux

01:45

In this video we will see Accessing file inside password protected windows system.

03:39

In this video we will see how to crack password protected windows 7 system

03:44

In this video we will see how to crack user passwords in a Linux system

01:49

In this video we will see Hacking password through browser

11:46
In this video we will see Pass Phrase
05:02
In this video we will see how to create stronger passwords
04:51

In this video we will see Facts on password hacking

Facts on password hacking
5 questions

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Amit Huddar, Scientist, Engineer, Android Developer,Trainer and CEO

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company "Softdust", which develops products using new technology such as Android Wear (smartwatch and Google Glass). He believes wearable gadgets are the future of personal computing.

He believe 2015 to 2025 is meant for app developers

Many made millions out of app development, yet he believe it's just beginning.

He is CEO of Softdust  (software firm).

Amit opted to study Computer Science Engineering in 2013 at SSIT. He started his software company in his first year of Engineering and it became successful, so he dropped out in September, 2014.

He has worked on non-conventional forms of energy.

Amit demonstrated his design of a tidal energy power plant model at a national level and won awards from prestigious institutes including the ISRO (Indian Space Research Organisation) and NITK (National Institute of Technology Karnataka).

He is quantum physicist too.

Amit worked on practical application of quantum leap with fellow scientists at IISc (Indian Institute of Science), India’s leading research institute and also ranked as 23rd best in the world.

He applies and believes in the law of attraction.

Whilst the basic principles of reasoning from physics are important to him, so equally is the law of attraction also important. This plays a very important role in his life.

Skills: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, building custom Linux OS, cloud computing, penetration testing, Kali Linux and Hacking.
Languages spoken: English, Hindi, Kannada.


Ready to start learning?
Take This Course