Unrevealed Secret Dos commands for Ethical Hackers

Learn to Perform Advanced level Operations on the System without use of any third party software in 2016.
4.4 (44 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
2,791 students enrolled
$19
$20
5% off
Take This Course
  • Lectures 20
  • Length 3.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 6/2015 English

Course Description

☸ Welcome to " Unrevealed Secret Dos Commands for Ethical Hackers  !" ☸

Get Enroll to the most exciting course today Before the Course Price raises to $195 , 2500+ Happy students were already enrolled .

This course is going to reveal the secret DOS commands which are used to perform the Advanced Operations on the System . From this course students will learn to manage known & unknown processes , To Manage hard disk to improve Performance , Trick to Recover corrupted Hard Disk / Pen drives / Memory Card , Learn to use command redirection Operators , Learn to Hide files / folders in such a way that no one can find in windows , Learn to gather system information about local as well as remote Machines , Monitoring the known & unknown Active Internet services in Depth , Administering the Network services , Interacting with windows Registery , Interacting with Windows NT service controller and services , Learn to using the task schedulder , Learn to access PC Remotely , Audting your PC for Computer viruses and Hackers Attack .

What are the requirements?

  • BASIC COMPUTER KNOWLEDGE IS ENOUGH TO JOIN THE COURSE

What am I going to get from this course?

  • After this course students will able to perform the Advanced Level Operations on the System without use of any kind of third party software . This is the exciting & Fun part of the Course .

What is the target audience?

  • Hackers
  • Programmers
  • Web Developers
  • Network Administrators
  • System Administrator

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Let's do some hack with DOS Window .
05:19
  1. In this section , Let's do some Basic hack with DOS Window .
Basic quiz on DOS
1 question
Section 2: Learn to secretly Hide files / folders from Command line .
05:01

At the end of this section , student will able to hide their files and folders from unauthorised users .and if such unauthorised uers trying to find these files and folders then they can not find in windows , with the help of show hidden files and folder option .

Secretly hide files / folders
1 question
Section 3: PROCESS MANAGEMENT
06:00

At the end of this section students will learn to manage the different processes from command line .

Process management
1 question
Section 4: DISK MANAGEMENT
07:12

At the end of this section student will able to manage their hard disk to increase the performance . for this we will see various commands.

Disk management
1 question
Section 5: RECOVERING CORRUPTED HARD DISK / MEMORY CARD / PAIN DRIVE VIA COMMAND LINE .
13:29

At the end of this section students will able to recover their corrupted hard disk , memory card or paindrive with the help of command line .

Recovering corrupted Harddisk
1 question
Section 6: PLAYING WITH COMMAND REDIRECTION OPERATORS .
09:15

At the end of this section , student will able to learn how to use command redirection operators , while dealing with dos commands . The command redirection operators helps students to use more than one command at a time to perform various tasks.

Command redirection operators
1 question
Section 7: INTERACTING WITH SYSTEM .
08:48

At the end of this section students will able to gather the information about the local as well as remote machines with the help of command line . These commands are very useful for hackers , to gather the system information without any external software .

Interacting with system
1 question
Section 8: MONITORING THE KNOWN & UNKNOWN ACTIVE INTERNET SERVICES .
06:36

At the end of this section students will able to monitor the known and unknown Internet services that are running on the system .They will also able to find what files they are using and what device drivers they are using etc .

Monitoring the Active internet services
1 question
Section 9: FINDING & TROUBLESHOOTING IP ADDRESSES.
09:41

At the end of this section , students will able to find their own ip address from command line . They can also find dns server ip . Also perform some operations to increase internet speed with the help of command line .

Finding & troubleshooting ip addresses
1 question
Section 10: ADMINISTERING THE NETWORK SERVICES .
15:31

At the end of this section students will able to interact with network . They are able interact with DNS . They are able to Interact with firewall .

Administering the Network services
1 question
Section 11: INTERACTING WITH WINDOWS REGISTERY.
09:09

At the end of this section student will able to interact with windows registery via command line .

1 question


Section 12: USING TASK SCHEDULDER .
10:21

At the end of this section students will able to use task schedulder to perform different tasks.

Task schedulder
1 question
Section 13: REMOTELY CONTROL YOUR PC .
06:33

At the end of this section students will learn how to control their pc remotely .

Remotely control your pc
1 question
Section 14: AUDITING YOUR PC FOR VIRUSES AND HACKER'S ATTACK .
16:26

At the end of this section students will able to Audit their PC whether it is hacked by some hacker or infected by some kind of virus .

Section 15: LET'S PLAY WITH DEBUG .
14:27

At the end of this section students will able to interact with DOS Debug , with the help of which they can write assemly coad , save that coad to a file . Test system port's . Able to interact with graphics card and bios date .

1 question


Section 16: INTERACTING WITH WINDOWS NT SERVICE CONTROLLER & SERVICES .
07:36

At the end of this section student will ablel to interact with windows NT service controller and services with the help of command line .

Windows NT Service controller & services
1 question
Section 17: ADVANCED FILES / FOLDERS & FILE SYSTEM MANAGEMENT .
14:20

At the end of this section students will able to encrypt & decrypt files and folders with the help of command line to protect data against unauthorised users . They will also able to wipeout hard disk or pain drive or memory card to prevent your confidential data , being recovered with the help of some recovery software by some unauhorised users.

11:50

THIS LECTURE CONTAINS THE REST OF THE SUBCOMMANDS FROM THE PREVIOUS VIDEO .

12:49

THIS LECTURE EXPLAINS THE COMMANDS & SUBCOMMANDS ABOUT MANAGING THE HARD DISK & FILE SYSTEM .

1 question


Section 18: MISCELLANEOUS COMMANDS .
08:32

At the end of this section students will get the Introductions to more useful and advanced commands .

Miscellaneous commands
1 question

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Shinde Prashant, ☸ Instructor at Udemy | Entrepreneur | C & C++ Developer ☸

 Computer Geek  Shinde Prashant. 

He achieves his Master's Degree in Computer's from Bill Gates Institute of Computer science & Management India .

He is the Founder of codeoffline.com. Having 7 years of experiance in computer programming , you can also call him a C & C++ Expert . He is teaching thousands of students worldwide with 114 different  countries including United States  , Canada , India , United Kingdom , Thiland , Egypt , Poland etc. 

In 2008 , while studying Bsc II year (Chemistry) , he joins a computer course where he Learns the Basics of Programming Languages & here the passion for Computers and Programming Languages is developed in him .  Due to passion he achieves Mastery over  14 different Programming Languages , 6 different Operating systems and he also expertise the following computer fields such as :- 

■  Ethical Hacking 

■  Software development

■  Website design & development 

■  Graphics design 

■  Digital Internet marketing 

■  Screen cast video production 

So that's why he calls him self a Computer geek ,  since 2014 he is working on one of his Dream Project's , with this Project he is going to share the whole knowledge to the world at affordable prize . So please wait for his upcoming courses !

Ready to start learning?
Take This Course