Ethical password hacking and protecting
3.1 (480 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
22,793 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical password hacking and protecting to your Wishlist.

Add to Wishlist

Ethical password hacking and protecting

This Video tutorial helps you to learn different password hacks and protecting methods.
3.1 (480 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
22,793 students enrolled
Created by Amit Huddar
Last updated 2/2016
English
Current price: $10 Original price: $200 Discount: 95% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 4 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • To know 5 different password hacking methods and it's counter measures
  • Create awareness on data stealing and hacking in IT firms
  • Protect your online password protected accounts
View Curriculum
Requirements
  • Laptop
  • Internet connection
Description

Last updated on 27-02-2016

"Course is great, in the guessing section, you almost knew my password, immediately changed it to 23 letters, I am very careful now with it, thanks!" - Ziad Ahmed Amer

"I have taken this course twice because there is so much valuable information. I was not aware that hacking software is available by Googling it. I found this to be very disturbing, however, I am grateful that this course is available to educate us on the software that is available to anyone. My gratefulness is extended due to the counter measures that are provided. Numerous scams are exposed for unsuspecting victims of phishing and hacking. Take advantage of this course so that you can be better prepared and secure. The content is informative, and the quality of the production met my expectations." - Matt Hayes

"This course is packed with great information. Very clear and easy to understand, and all directly to the point, no filler or fluff! Job well Done!" - Don Nir

Ethical Password hacking and protecting is an video tutorial which helps you to learn different password hacks and protecting methods. Videos in this course demonstrate hacking and protecting WiFi and many other password protected accounts using keylogger, guessing, brute force, phishing, social engineering methods and counter measure for each of them.

It's a beneficial course to learn different password hacking methods and to protect your password protected accounts from hackers. All methods are pretty well explained and demonstrated step by step in all videos. It's crash course in ethical hacking. It's a very delightful course to hacking enthusiast's.

How to use:

Watch all videos in full screen and land slide view. Internet connection more than 30kbps is necessary to stream all videos properly. If any technical difficulty appears report to instructor through message option. Any doubts, clarification or suggestion on improvement of course message instructor or post in discussion before giving any bad review.

Disclaimer :

This course is meant for education purpose only, we aren't responsible of implementation of any hack learnt in it, this course is made with vision to create awareness on hacks. As most of the people are suffering from lack of awareness.

Who is the target audience?
  • Hacking Enthusiasts
  • Students who are interested to pursue career in security
  • Internet entrepreneurs worried about their security
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 72 Lectures Collapse All 72 Lectures 04:03:33
+
Disclaimer
2 Lectures 02:09
+
Keylogger
11 Lectures 30:51

In keylogging or RATing the hacker sends keylogger or rat to the victim.

This allows hacker to monitor every thing victim do on his computer.

Every keystroke is logged including passwords. In this tutorial we will demonstrate

different key logger software for windows, android, mac and iphone and we will explain

the counter measure to avoid your password being hacked.

Preview 00:41

use this link to download https://drive.google.com/file/d/0B04Rxwy3-APWT2ZMQVJhS0twZms/view?usp=sharing

Preview 03:28

In this video we mentioned keylogger software for mac, windows, Android os, iOS.

Software for keylogger
01:42

In this video we demonstrate about WhatsApp hacking through mspy app.

hacking whatsapp is demonstrated in this video anyone can follow it and can hack anyone's whatsapp account on android, i Phone, Blacberry, wondows phone etc.

Whatsapp hacking
02:36

In this video we show how to purchase mspy app and install in victim device.

Whatsapp hacking hands on
09:28

In this video we demonstrated and examine result after few hours on the victim device through mspy app.

Preview 01:21

In this video we show you how to deactivate/cancel subscription of mspy app.
Whatsapp hacking hands on - cancel subscription
01:49

In this video we demonstrate rooting android device to install mspy app.

Rooting android device to install mspy app
03:58

Whatsapp hacking hands on
2 questions

In this video we demonstrate you how to find and remove hidden keyloggers in your PC/windows OS.

Counter measures for keylogger
01:09

In this video we demonstrate you how to find and remove hidden keyloggers in your android OS/phones

Finding keylogger in Android
02:44

In this video we demonstrate you how to find and remove hidden keyloggers in your mac OS.

Finding keylogger in MAC OS
01:55
+
Guessing
6 Lectures 13:24

Guessing password is the most simple and efficient

way to hack any account

We will see list of most common password used across the world,

few tricks and technique to guess password

and finally

we will hack Facebook account by guessing and brute force without getting blocked

We will also see counter measures to avoid it

Preview 00:28

In this video we show Guessing the common passwords for hacking password.

Guessing password
01:58

In this video we explain what is minimum requirement for brute force and phishing
Software for brute force
01:53

Introduction to Kali Linux
06:39

In this video facebook user account is hacked using guessing and brute force.


Brute force with help of guessing
01:27

In this video we will see counter measures for guessing passwords.

Counter measures for guessing
00:59

Guessing
1 question
+
Brute force
17 Lectures 01:16:45

Brute force cracking is a trial and error method used by application to decode password

through exhaustive effort rather than employing intellectual strategies.

brute force cracking application proceeds through all possible combinations

of legal characters in sequence, In this tutorial we will demonstrate you software's used for

Brute force cracking by cracking actual password and we will explain the counter measure to avoid

your password being cracked.

Preview 00:32

In this video we will see what we need for brute force and phishing.

what you need for brute force
01:53

In this video we will see where not to use Virtual box
Why not to use virtual box
01:54

In this video we demonstrate you hacking wifi network using brute force technique.

how to crack WiFi password is demonstrated in this video using kali linux.

Wifi password hacking through brute force
02:20

In this video we demonstrate you hacking wifi network using brute force technique

in depth.

Wifi password hacking through brute force in depth with explanation
06:18

In this video facebook user account is hacked using guessing and brute force

Hacking through brute force and guessing
01:27

In this video we will see setting up of kali linux in virtual box
Setting up kali linux in virtual box
08:41

In this video we will see setting up DVWA

Setting up DVWA -1
03:45

In this video we will see setting up DVWA

Setting up DVWA-2
05:33

In this video we will see Introduction to hydra

Introduction to Hydra
02:53

In this video we will see Hydra collecting information

Hydra collecting information
15:10

In this video we will see Using hydra to brute force

Using hydra to brute force
04:49

In this video we will see List of password

List of password
02:20

In this video we demonstrate you how to brute force WiFi using smart phone.

Download CJ Brutus: bruteforce WIFI APK

http://mobile9apk.com/Download_CJ-Brutus-bruteforce-WIFI_APK.html


https://drive.google.com/file/d/0B04Rxwy3-APWcmFvOElxd2VHcW8/view?usp=sharing

Brute force WiFi using smart phone
02:39

In this video we will see how to L0pht crack download and install

L0pht crack download and install
03:52

In this video we will see L0pht crack wizard

L0pht crack wizard
10:16

In this video we will see how to protect WiFi and facebook account from brute force.

Counter measures for brute force
02:23

Brute force
4 questions
+
Phishing
23 Lectures 58:00

phishing

The act of sending an email to a user falsely claiming to be an established legitimate enterprise in

an attempt to scam the user into surrendering private information that will be used for identity theft.

Phishing email will direct the user to visit a website where they are asked to update personal information,

such as a password, credit card, social security, or bank account numbers, that the legitimate organization

already has. The website, however, is bogus and set up only to steal the information the user enters on the page.

Preview 00:29

In this video we show what we need for brute force and phishing.

What you need for phishing
01:53

In this video we show how to hack facebook acount password using phishing.

how to hack a facebook account password online through phishing is demonstrated in this video.

Password hacking through phishing
03:50

In this video we show what thing we should know/do while cloning login page.

Things to keep in mind while cloning login page
02:18

In this video we demonstrate about login page of any website can be cloned or not?

login page of any website can be cloned?
01:25

In this video we will learn to use domain name for phishing.

Using domain name for phishing -1/2
02:56

In this video we will learn to use domain name for phishing.

Using domain name for phishing-2/2
01:14

https://drive.google.com/file/d/0B04Rxwy3-APWVUJNMVlCaUF0OTQ/view?usp=sharing

In this video we show how to develop facebook phishing page.

Developing facebook phishing page(optional but recommended way)
03:05

In this video we show how to host facebook phishing page.

Hosting Facebook phishing page
02:55

In this video we demonstrate facebook phishing page in depth and explanation.

Phishing page in depth with explanation
02:34

In this video we show that how to Attach phishing page to domain.

Attaching phishing page to domain
02:41

In this video we will see plan of google AdWords for phishing.

Using Google AdWords for phishing -1/10- Plan
01:34

In this video we will demonstrate setting up AdWord account.

Using Google AdWords for phishing -2/10 - Setting up AdWord account
02:47

In this video we will see AdWord account in brief.

Using Google AdWords for phishing -3/10- AdWord account in brief
02:12

In this video we will see keyword.

Using Google AdWords for phishing -4/10- Keyword
01:26

In this video we will see keyword match type.

Using Google AdWords for phishing -5/10- Keyword match
02:16

In this video we will see keyword planner.

Using Google AdWords for phishing -6/10- Keyword planner
02:29

In this video we will see creating campaign.

Using Google AdWords for phishing -7/10- Creating campaign
04:09

In this video we will see result using google AdWords for phishing.

Preview 01:41

In this video we will see Budget

Using Google AdWords for phishing-9/10 -Budget
02:56

In this video we will see the summary for google AdWords for phishing.

Using Google AdWords for phishing -10/10- Summary
03:49

you can add many things in it like

buying email id

the way those phishing email are written

again say mechanism

Phishing through email in depth- custom email
06:44

In this video we will see counter measures for phishing.

Counter measures for phishing
00:37

Phishing
2 questions
+
Social Engineering
4 Lectures 13:33

Social engineering is the art of manipulating people so they give up confidential information.

The types of information these criminals are seeking can vary, but when individuals are targeted

the criminals are usually trying to trick you into giving them your passwords or bank information,

or access your computer to secretly install malicious software–that will give them access to your

passwords and bank information as well as giving them control over your computer.

Preview 01:20

In this video we will see Social engineering through human method.

Social engineering through human method
05:47

In this video we will see Social engineering through computer method.

Social engineering through computer method
04:56

In this video we will see counter measures for Social engineering.

Counter measures for social engineering engineering
01:30
+
Miscellaneous
9 Lectures 48:51

In this video we will see SQL Injection

SQL Injection
09:32

In this video we will see how to hack Windows 7 Metasploit using Kali Linux

Hack Windows 7 with Metasploit using Kali Linux
06:43

In this video we will see Accessing file inside password protected windows system.

Accessing file inside password protected windows system
01:45

In this video we will see how to crack password protected windows 7 system

crack into password protected windows 7 system
03:39

In this video we will see how to crack user passwords in a Linux system

Crack User Password in a Linux System
03:44

In this video we will see Hacking password through browser

Hacking password through browser
01:49

In this video we will see Pass Phrase
Pass Phrase
11:46

In this video we will see how to create stronger passwords
How to create stronger passwords
05:02

In this video we will see Facts on password hacking

Facts on password hacking
04:51

Facts on password hacking
5 questions
About the Instructor
Amit Huddar
3.9 Average rating
1,389 Reviews
54,894 Students
11 Courses
Scientist, Engineer, Android Developer,Trainer and CEO

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company "Softdust", which develops products using new technology such as Android Wear (smartwatch and Google Glass). He believes wearable gadgets are the future of personal computing.

He believe 2017 to 2025 is meant for app developers

Many made millions out of app development, yet he believe it's just beginning.

He is CEO of Softdust  (software firm).

Amit opted to study Computer Science Engineering in 2013 at SSIT. He started his software company in his first year of Engineering and it became successful, so he dropped out in September, 2014.

He has worked on non-conventional forms of energy.

Amit demonstrated his design of a tidal energy power plant model at a national level and won awards from prestigious institutes including the ISRO (Indian Space Research Organisation) and NITK (National Institute of Technology Karnataka).

He is quantum physicist too.

Amit worked on practical application of quantum leap with fellow scientists at IISc (Indian Institute of Science), India’s leading research institute and also ranked as 23rd best in the world.

He applies and believes in the law of attraction.

Whilst the basic principles of reasoning from physics are important to him, so equally is the law of attraction also important. This plays a very important role in his life.

Skills: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, building custom Linux OS, cloud computing, penetration testing, Kali Linux and Hacking.
Languages spoken: English, Hindi, Kannada.