TAKE THIS COURSE₹ 17,800
Course Currilcum
-
- Knowing JAP 00:00:00
- Elaborating JAP 00:00:00
-
- All About Chalo INDIA Startup Drive 00:00:00
- Introduction to Ethical Hacking 00:00:00
- Overview of Malware 00:00:00
- Viruses and Worms 00:00:00
- Ransomware and Crypto Malware 00:00:00
- Trojans and RATs 00:00:00
- Rootkits 00:00:00
- Keyloggers 00:00:00
- Adware and Spyware 00:00:00
- Bots and Botnets 00:00:00
- Logic Bombs 00:00:00
- What is Linux? 00:00:00
- Lab Setup 00:00:00
- lab setup Part 2 00:00:00
- Building our own lab 00:00:00
- Getting Started 00:00:00
- Getting Started Part 2 00:00:00
- Basic Commands of linux 00:00:00
- Files and the Filesystem 00:00:00
- Files and the Filesystem part2 00:00:00
- Users and Groups 00:00:00
- Installing software 00:00:00
- Installing software part 2 00:00:00
- Manually installing software 00:00:00
- Shells 00:00:00
- shells part 2 00:00:00
- Shells part 3 00:00:00
- More utilities 00:00:00
- more utilities part 2 00:00:00
- more utilities part 3 00:00:00
- Networking at Command line 00:00:00
- File transfer utilities 00:00:00
- Learning Linux Part – 1 00:00:00
- Learning Linux Part – 2 Unlimited
- Learning Linux Quiz 00:01:00
- Building our Lab Unlimited
- Process management 00:00:00
- Process management part 2 00:00:00
- Ethical Hacking Methodology Unlimited
- Latest lab setup 00:00:00
- Networking – Electricity in Computing Unlimited
- Networking Layers Unlimited
- Introduction to Vulnerability Unlimited
- VALC – Vulnerability Assessment Life Cycle Unlimited
- Using NMAP to find Vulnerability Unlimited
- Introduction to Exploitation Unlimited
- Manual Exploitation Unlimited
- Reverse Shell and Bind shell Unlimited
- Staged and Non-Staged Payloads Unlimited
- Automatic Exploitation Unlimited
- Introduction to Shell Scripting Unlimited
- Text Editor Unlimited
- Naming & Permission of Shell Script Unlimited
- Shell Scripting – Hello World Unlimited
- Shell Scripting – Why? Unlimited
- User Defined Variables Unlimited
- System Variables Unlimited
- Command Line Argument Unlimited
- Read Command Unlimited
- Command Substitution Unlimited
- For Loop Unlimited
- Functions Unlimited
- While Loop Unlimited
- Until Loop Unlimited
- If Else Condition Unlimited
- Case Statement Unlimited
- Bash Debugging Unlimited
- Python Scripting 1 00:00:00
- Doppelg��nger Domain Unlimited
- Introduction to Web App Pentesting Unlimited
- Spidering and Fuzzing with ZAP 00:00:00
- Bug Hunting Platforms Unlimited
- Introduction to recon Unlimited
- Enumerating Subdomains – Sublist3r Unlimited
- Enumerating Subdomains – Assetfinder Unlimited
- Finding Live Domains Unlimited
- Sorting Live Subdomains Unlimited
- Enumerating Subdomains – Gobuster Unlimited
- Subdomain & X-Request QUIZ 00:02:00
- Web challenges 1 00:00:00
- PHP Code Injection Lab 00:00:00
- Practical SQL injection 00:00:00
- Introduction to Cryptography 00:00:00
- Objectives of Cryptography 00:00:00
- Types of cryptography 00:00:00
- Encoding & Decoding 00:00:00
- symetric key encryption 00:00:00
- WORKING OF DES 00:00:00
- Cryptanalysis 00:00:00
- SSH 00:00:00
- Hashing 00:00:00
- Checking File Integritiy 00:00:00
- Crpytanalysis_practical 00:00:00
- Disk Encryption 00:00:00
- ssl 00:00:00
- Introduction to Android 00:00:00
- Android Architecture 00:00:00
- Connecting a Wireless Adapter To Kali 00:00:00
- Android App Structure Intents 00:00:00
- Android App Structure-Broadcast Receive 00:00:00
- M1: Improper Platform Usage 00:00:00
- M2: Insecure Data Storage 00:00:00
- M3: Insecure Communication 00:00:00
- M4: Insecure Authentication 00:00:00
- M5: Insufficient Cryptography 00:00:00
- M6: Insecure Authorization 00:00:00
- M7: Client Code Quality 00:00:00
- M8: Code Tampering 00:00:00
- M10: Extraneous Functionality 00:00:00
- Reversing APK 00:00:00
- Reversing APK 00:00:00
- Ethical Hacking OWASP Quiz 00:02:00
- Hardcording Issues 00:00:00
- MobSF setup 00:00:00
- MobSF Static analysis 00:00:00
- Introduction to Network Pentesting 00:00:00
- Network Basics 00:00:00
- Information Gathering 00:00:00
- Information gathering 2 00:00:00
- Information gathering 3 00:00:00
- Active Information gathering 00:00:00
- Active Information gathering lab 00:00:00
- What is MAC Address & How To Change It 00:00:00
- CTF 1 00:00:00
- CTF 2 00:00:00
- CTF 3 00:00:00
- CTF 4 00:00:00
- CTF 5 00:00:00
- CTF 6 00:00:00
- CTF 6 Part 2 00:00:00
- CTF 7 00:00:00
- CTF 7 Part2 00:00:00
- CTF 8 00:00:00
- CTF 8 part2 00:00:00
- CTF 9 00:00:00
- CTF9 Part2 00:00:00
- CTF 10 00:00:00
- CTF 10 Part 2 00:00:00
- CTF 10 part 3 00:00:00
- LINUX boxes 1 00:00:00
- Linux Boxes 1 part 2 00:00:00
- LINUX boxes 2 00:00:00
- LINUX Boxes 2 part 2 00:00:00
- LINUX boxes 3 00:00:00
- LINUX boxes 3 part 2 00:00:00
- LINUX boxes 3 part 3 00:00:00
- LINUX boxes 4 00:00:00
- LINUX boxes 4 part 2 00:00:00
- LINUX boxes 4 part 3 00:00:00
- LINUX boxes 5 00:00:00
- LINUX boxes 5 part 2 00:00:00
- LINUX boxes 5 part 3 00:00:00
- LINUX boxes 6 00:00:00
- LINUX boxes 6 part 2 00:00:00
- LINUX boxes 7 00:00:00
- LINUX boxes 7 part 2 00:00:00
- LINUX boxes 7 part 3 00:00:00
- LINUX boxes 8 00:00:00
- LINUX boxes 8 part 2 00:00:00
- LINUX boxes 9 00:00:00
- LINUX boxes 9 part 2 00:00:00
- LINUX boxes 9 part 3 00:00:00
- LINUX boxes 10 00:00:00
- LINUX boxes 10 part 2 00:00:00
- LINUX boxes 10 part3 00:00:00
- Windows Boxes 1 00:00:00
- Networking Quiz 00:02:00
- FINAL TEST- Ethical Hacking in English 5 days
- Congrats ! Submit the course completion form. 00:00:00
- OWASP TOP 10 – XSS 00:00:00
- Config Kali for API 00:00:00
- AD local Priv to Adminsrv 00:00:00
- Topology – Latrex Injection 00:00:00