🚨 Time is Running Out: Reserve Your Spot in the Lucky Draw & Claim Rewards! START NOW
watching now
1 Students

Description

What Will You Learn?

  • Learn to Install Ubuntu
  • Understand Ethical Hacking
  • Learn to Create a Phishing App
  • Learn to Create a Keylogger
  • Learn How to Capture Keystrokes

Requirements

  • Basic Experience with Using Android
  • Basic Knowledge and Experience with IT
  • NFT Certificate
  • 54 Lessons
  • Beginner
  • English
  • 4.0 Rating
  • +100 XP

Share Course on Social media

Curriculum

Course consist of total 2h 1min of content, in total.

Section 2: Termux basic Operations
18:33
Termux Introduction and Installation
02:33
Termux Storage Setup
02:54
Sending SMS Via Termux
01:29
Installing Advanced Hacking Tools
01:42
Ubuntu ROOT Terminal Installation
02:28
How to use Ubuntu ROOT terminal
03:04
Steganography-How to Hide Data Behind Any Image
02:21
Steganography-How The Data is Extracted at Destination Side
01:32
Section 3: Information Gathering
09:10
Things You will Learn
00:27
Information Gathering - Whois Lookup and DNS Lookup
02:24
Information Gathering - Port Scanning and Links Grabbing
01:43
Information Gathering - IP Location Finding and Traceroute
01:18
Extracting Emails and User Information
03:18
Section 4: Network Scanning
05:40
Finding Live or UP Hosts in Network
01:10
Listing Open Ports On a Target Host
01:21
Generating a Scan Report
01:28
Section 5: Denial of Service (DoS) attacks Demonstrated and explained
07:02
Things You will Learn
00:31
Performing DOS Attack with Termux
04:27
Performing DOS Attack without Termux
02:04
Section 6: How Hackers Really Crack Your Passwords
05:48
Things You will Learn
01:15
Cracking Password with Brute Force Attack
02:48
Cracking Password with Dictionary Attack
01:45
Section 7: Exploitation
33:25
Things You will Learn
00:21
Introduction and Installing Metasploit Framework on Termux
02:28
Extract Email Address of Domain using Metasploit
02:17
Hack Windows Machine By Creating a Backdoor-Msfvenom Payload With Netcat
03:18
Hacking windows Machine with Metasploit
03:26
Hack Linux Systems by Generating a more Advanced Backdoor
03:05
Hacking an Android Device with MSFvenom
03:08
Capturing keystrokes with Metasploit
01:31
Meterpreter Basic Commands
02:20
Generate Payloads and Control Remote Machines
05:15
Continuing -Generate Payloads and Control Remote Machines
03:36
Get Every Single Saved Password From Victim Machine
02:40
Section 8: Things You Will Learn
10:31
Things You Will Learn
00:18
Email Spoofing-Send E-Mail Using Fake or Other Person's E-Mail
02:11
E-Mail Bomber Sending Unlimited Fake Mails to Victim
02:33
Performing a Phishing Attack to steal Victim credentials
03:18
Creating a KEYLOGGER On Android
02:11
Section 9: Using The Above Attacks Outside The Local Network
23:02
Things You will Learn
00:21
Ngrok Installation, Configuration and Port Forwarding
02:51
Remotely Hack Any Android Device with Metasploit - Hack Over WAN
04:35
Hack Any Windows Machine Outside LAN
05:14
Phishing Attack outside LAN Using Ngrok
03:26
Phishing Attack Over Wan without Termux
02:50
Creating Your Own Phishing App(Application)
03:45
Section 10: How to Be Safe From Above Attacks
06:37
How to Detect Spoof Emails
01:56
How To Detect Trojans
02:53
How to Detect Phishing Page
01:48

About the Instructor

Instructor Muhammad Ali is a wise Swiss knife in the field of computer science. He combines his professional knowledge in Computer Network Engineering (Master’s degree with distinction) with a great passion and experience in ethical hacking, which makes him a trusted expert. Besides teaching online, he also works as a network engineer, security analyzer, and researcher in IT security.

As Muhammad Ali has spent a good portion of life in an academic setting as a student and researcher, he’s developed an effective teaching methodology, too. His lectures flow from explaining the theory behind every technique he teaches to showing how it works in a realistic scenario. His working experience allowed him to accumulate a rich base of real-life examples which make it much easier and practical to learn the complex concepts of penetration testing, network attacks and similar topics.

On BitDegree, you may take the chance to learn the core principles of network security and ethical hacking with Android from Muhammad Ali. Get the direct transition of knowledge from an expert!

See All Instructor Courses

BitDegree platform reviews