Welcome this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge and By the end of the course you will have a strong foundation in most hacking or penetration testing fields and you'll also learn how to detect, prevent and secure systems and yourself from the discussed attacks.
TAKE THIS COURSE₹ 17,800
Course Currilcum
-
- Introduction to Ethical Hacking 00:00:00
- Information Security Overview 00:00:00
- Hacking Concepts 00:00:00
- Ethical Hacking Concepts 00:00:00
- Information Security Controls 00:00:00
- Information Security Laws and Standards 00:00:00
-
- Knowing JAP 00:00:00
- Elaborating JAP 00:00:00
- All about Chalo India Startup Drive 00:00:00
- Network Scanning Concepts 00:00:00
- Scanning Tools 00:00:00
- Host Discovery 00:00:00
- Port and Service Discovery 00:00:00
- OS Discovery (Banner Grabbing/OS Fingerprinting) 00:00:00
- Scanning Beyond IDS and Firewall 00:00:00
- Draw Network Diagrams 00:00:00
- AVODHA Official Telugu YouTube Channel 00:00:00
- Vulnerability Assessment Concepts 00:00:00
- Vulnerability Classification and Assessment Types 00:00:00
- Vulnerability Assessment Solutions and Tools 00:00:00
- Vulnerability Assessment Reports 00:00:00
- Malware Concepts 00:00:00
- APT Concepts 00:00:00
- Trojan Concepts 00:00:00
- Virus and Worm Concepts 00:00:00
- Malware Analysis 00:00:00
- Countermeasures 00:00:00
- Initial Preparation 00:00:00
- Installing Kali Linux as a VM on Windows 00:00:00
- Sniffing Concepts 00:00:00
- Sniffing Techniques 00:00:00
- Sniffing Tools 00:00:00
- Countermeasures 00:00:00
- Sniffing Detection Techniques 00:00:00
- SQL Injection Concepts 00:00:00
- Types of SQL Injection 00:00:00
- SQL Injection Methodology 00:00:00
- SQL Injection Tools 00:00:00
- Learning Linux Part – 1 00:00:00
- Learning Linux Part – 2 00:00:00
- Building our Lab 00:00:00
- Ethical Hacking Methodology 00:00:00
- Introduction and NMAP 00:00:00
- NMAP Basic Scanning 00:00:00
- NMAP Multiple Targets 00:00:00
- TCP Connect Scan 00:00:00
- Stealth Scan 00:00:00
- ACK Probe 00:00:00
- Service and OS detection 00:00:00
- Aggressive Scanning 00:00:00
- UDP Scanning 00:00:00
- NMAP Output 00:00:00
- Docker 00:00:00
- Webmap 00:00:00
- Introduction to Shell Scripting 00:00:00
- Nessus 00:00:00
- Introduction to Steganography 00:00:00
- Technical Steganography 00:00:00
- Linguistic Steganography 00:00:00
- Hiding message using Steganography 00:00:00
- Password Cracking 00:00:00
- Active online track 00:00:00
- Offline attack 00:00:00
- Steganography and Password Cracking Challenge 00:00:00
- Introduction to Social Engineering 00:00:00
- Relevance of Social Engineering 00:00:00
- Human Based Social Engineering 00:00:00
- Computer Based Social Engineering 00:00:00
- Phishing 00:00:00
- Mobile Based Social Engineering 00:00:00
- Doppelg��nger Domain 00:00:00
- Introduction to OWASP Top 10 00:00:00
- Injection 00:00:00
- Manual SQL Injection 00:00:00
- Configuring Burpsuite 00:00:00
- Automated SQL Injection 00:00:00
- Command Injection 00:00:00
- Injection prevention 00:00:00
- Broken Authentication 00:00:00
- Credential Stuffing 00:00:00
- Sensitive Data Exposure 00:00:00
- Sensitive Data Exposure- Prevention 00:00:00
- XML External Entities (XXE) 00:00:00
- Insecure Direct Object Reference (IDOR) 00:00:00
- Security Misconfiguration 00:00:00
- Broken Access Control 00:00:00
- Cross Site Scripting 00:00:00
- XSS Exploitation 00:00:00
- Insecure Deserialization 00:00:00
- Using Components with Known vulnerabilities 00:00:00
- Insufficient Logging and Monitoring 00:00:00
- Clickjacking 00:00:00
- Broken Link Hijacking 00:00:00
- Cross Site Request Forgery (CSRF) 00:00:00
- No Rate limiting 00:00:00
- HSTS 00:00:00
- Server Side Request Forgery(SSRF) 00:00:00
- Report Writing 00:00:00
- Network Insecurity 00:00:00
- Sniffing & Spoofing 00:00:00
- Spoofing, crypto, and wifi 00:00:00
- DEMO – tcpdump 00:00:00
- Introduction to Android 00:00:00
- Android Architecture 00:00:00
- Android App Structure Intents 00:00:00
- Android App Structure-Broadcast Receive 00:00:00
- QUIZ 2 – Footprinting and Reconnaissance 00:04:00
- QUIZ 3 – Scanning Networks 00:04:00
- QUIZ 4 – Vulnerability Analysis 00:04:00
- Quiz 00:05:00
- Learning Linux Quiz 00:15:00
- ACK Quiz – Internet Research Quiz 00:00:00
- Scanning Quiz-1 00:05:00
- ENUMERATION QUIZ 00:15:00
- Google Dorks Quiz 00:15:00
- Steganography and Password Cracking Challenge In Telugu 12:00:00
- Shell Scripting Quiz 00:05:00
- Create Shell Script for Recon 12:00:00
- Subdomain & X-Request QUIZ 00:10:00
- Ethical Hacking OWASP Quiz 00:10:00
- CRACK THE VM 00:00:00
- Quiz – 1 00:04:00