• No products in the cart.

Course Curriculum

  • Steganography and Password Cracking Challenge 00:00:00
  • Create Shell Script for Recon 00:00:00
  • CRACK THE VM Unlimited
  • 00:00:00
  • Introduction to Ethical Hacking
    Basics of Networking Part – 1 00:00:00
    Job Acceleration Program (JAP)
    Knowing JAP 00:00:00
    Elaborating JAP 00:00:00
    Overview of Cybercrime – part 3 (Email related crimes,Financial crimes) 00:00:00
    Ovewview of Cybercrime- part5(Other cybercrime, Reasons for commission of cybercrime), 00:00:00
    About Cybersecurity 00:00:00
    Introduction to Kali Linux 00:00:00
    Chalo INDIA Startup Drive
    All about Chalo India Startup drive 00:00:00
    Linux Basic Commands – Part 1 00:00:00
    Linux Basic Commands – Part 2 00:00:00
    Linux Advance Commands – Part 2 00:00:00
    Introduction to Hacking Phases 00:00:00
    Introduction to Footprinting 00:00:00
    Introduction to Ethical Hacking 00:00:00
    Networking Basics
    Networking ļæ½ļæ½ļæ½ Electricity in Computing 00:00:00
    Networking Layers 00:00:00
    Linux Basics
    Learning Linux Part ļæ½ļæ½ļæ½ 1 00:00:00
    Learning Linux Part ļæ½ļæ½ļæ½ 2 00:00:00
    Building our Lab 00:00:00
    Ethical Hacking Methodology 00:00:00
    AVODHA Official Kannada YouTube Channel 00:00:00
    Data Intelligence
    Passive Information Gathering 00:00:00
    OSINT-Maltego 00:00:00
    OSINT-Recon 00:00:00
    OSINT-theHarvester 00:00:00
    OSINT-Shodan 00:00:00
    DNS-Enumeration 00:00:00
    DNS-Zone Transfer 00:00:00
    Google Dorks 00:00:00
    Dare & Milestones 00:00:00
    Scanning
    Introduction and NMAP 00:00:00
    NMAP Basic Scanning 00:00:00
    NMAP Multiple Targets 00:00:00
    TCP Connect Scan 00:00:00
    Stealth Scan 00:00:00
    ACK Probe 00:00:00
    Service and OS detection 00:00:00
    Aggressive Scanning 00:00:00
    UDP Scanning 00:00:00
    NMAP Output 00:00:00
    Docker 00:00:00
    Webmap 00:00:00
    Introduction to Scripting 00:00:00
    Vulnerability Assessment
    Introduction to Vulnerability 00:00:00
    VALC ļæ½ļæ½ļæ½ Vulnerability Assessment Life Cycle 00:00:00
    Using NMAP to find Vulnerability 00:00:00
    Nessus
    Nessus 00:00:00
    Exploitation
    Introduction to Exploitation 00:00:00
    Manual Exploitation 00:00:00
    Reverse Shell and Bind shell 00:00:00
    Staged and Non-Staged Payloads 00:00:00
    Automatic Exploitation 00:00:00
    Exploitation Box 00:00:00
    Steganography
    Introduction to Steganography 00:00:00
    Technical Steganography 00:00:00
    Linguistic Steganography 00:00:00
    Hiding message using Steganography 00:00:00
    Password Cracking 00:00:00
    Active online attack 00:00:00
    Offline attack 00:00:00
    Steganography and Password Cracking Challenge 00:00:00
    Shell Scripting
    Introduction to Shell Scripting 00:00:00
    Text Editor 00:00:00
    Naming & Permission of Shell Script 00:00:00
    Shell Scripting ā€“ Hello World 00:00:00
    Shell Scripting ā€“ Why? 00:00:00
    User Defined Variables 00:00:00
    System Variables 00:00:00
    Command Line Argument 00:00:00
    Read Command 00:00:00
    Command Substitution 00:00:00
    For Loop 00:00:00
    Functions 00:00:00
    While Loop 00:00:00
    Until Loop 00:00:00
    If Else Condition 00:00:00
    Case Statement 00:00:00
    Bash Debugging 00:00:00
    Social Engineering
    Introduction to Social Engineering 00:00:00
    Relevance of Social Engineering 00:00:00
    Human Based Social Engineering 00:00:00
    Computer Based Social Engineering 00:00:00
    Phishing 00:00:00
    Mobile Based Social Engineering 00:00:00
    DoppelgƤnger Domain 00:00:00
    Web Application Pentesting
    Introduction to Web App Pentesting 00:00:00
    Bug Hunting Platforms 00:00:00
    Introduction to recon 00:00:00
    Enumerating Subdomains ā€“ Sublist3r 00:00:00
    Enumerating Subdomains ā€“ Assetfinder 00:00:00
    Finding Live Domains 00:00:00
    Sorting Live Subdomains 00:00:00
    Enumerating Subdomains ā€“ Gobuster 00:00:00
    OWASP
    Introduction to OWASP Top 10 00:00:00
    Injection 00:00:00
    Manual SQL Injection 00:00:00
    Configuring Burpsuite 00:00:00
    Automated SQL Injection 00:00:00
    Command Injection 00:00:00
    Injection prevention 00:00:00
    Broken Authentication 00:00:00
    Credential Stuffing 00:00:00
    Broken Authentication ā€“ Prevention 00:00:00
    Sensitive Data Exposure 00:00:00
    Sensitive Data Exposure- Prevention 00:00:00
    XML External Entities (XXE) 00:00:00
    Insecure Direct Object Reference (IDOR) 00:00:00
    Security Misconfiguration 00:00:00
    Broken Access Control 00:00:00
    Cross Site Scripting 00:00:00
    XSS Exploitation 00:00:00
    Insecure Deserialization 00:00:00
    Using Components with Known vulnerabilities 00:00:00
    Insufficient Logging and Monitoring 00:00:00
    Clickjacking 00:00:00
    Broken Link Hijacking 00:00:00
    Cross Site Request Forgery (CSRF) 00:00:00
    No Rate limiting 00:00:00
    HSTS 00:00:00
    Server Side Request Forgery(SSRF) 00:00:00
    Subdomain Takeover 00:00:00
    Report Writing 00:00:00
    HI ,THIS IS THE NEW CHALLENGE CRACK THE VM 00:00:00
    Cryptography
    Introduction to Cryptography 00:00:00
    Objectives of Cryptography 00:00:00
    Types of cryptography 00:00:00
    Encoding & Decoding 00:00:00
    symetric key encryption 00:00:00
    WORKING OF DES 00:00:00
    ASYMMETRIC KEY CRYPTOGRAPHY 00:00:00
    E-MAIL ENCRYPTION 00:00:00
    Hashing 00:00:00
    Checking File Integritiy 00:00:00
    SSH 00:00:00
    Cryptanalysis 00:00:00
    ssl 00:00:00
    Crpytanalysis_practical 00:00:00
    Disk Encryption 00:00:00
    WEB PRESENCE
    Network Insecurity 00:00:00
    Sniffing & Spoofing 00:00:00
    Spoofing, crypto, and wifi 00:00:00
    DEMO ā€“ tcpdump 00:00:00
    NETWORK PENTESTING
    Introduction to Network Pentesting 00:00:00
    Network Basics 00:00:00
    Connecting a Wireless Adapter To Kali 00:00:00
    What is MAC Address & How To Change It 00:00:00
    Android Pentesting
    Introduction to Android 00:00:00
    Android Architecture 00:00:00
    Android App Structure Intents 00:00:00
    Android App Structure-Broadcast Receive 00:00:00
    Lab Setup
    Setting up Genymotion 00:00:00
    Connecting Genymotion with Burpsuite 00:00:00
    Jadx setup 00:00:00
    Drozer Setup 00:00:00
    OWASP Top 10
    M1: Improper Platform Usage 00:00:00
    M2: Insecure Data Storage 00:00:00
    M3: Insecure Communication 00:00:00
    M4: Insecure Authentication 00:00:00
    M5: Insufficient Cryptography 00:00:00
    M6: Insecure Authorization 00:00:00
    M7: Client Code Quality 00:00:00
    M7: Client Code Quality 00:00:00
    M8: Code Tampering 00:00:00
    M9: Reverse Engineering 00:00:00
    M10: Extraneous Functionality 00:00:00
    Reversing APK -1 00:00:00
    Reversing APK-2 00:00:00
    Static Analysis
    Hardcording Issues 00:00:00
    MobSF setup 00:00:00
    MobSF Static analysis 00:00:00
    Dynamic Analysis
    Dynamic Analysis using Logcat 00:00:00
    Dynamic Analysis using Drozer (SQL Injection) 00:00:00
    No rate Limiting attack 00:00:00
    Dynamic analysis using MobSF 00:00:00
    QUIZ SECTION
    Learning Linux Quiz 00:01:00
    Networking Quiz 00:02:00
    ACK Quiz ā€“ Internet Research Quiz 00:01:00
    Scanning Quiz-1 00:02:00
    Google Dorks Quiz 00:02:00
    Shell Scripting Quiz 00:01:00
    Subdomain & X-Request QUIZ 00:02:00
    Ethical Hacking OWASP Quiz 00:02:00
    Quiz – 1 00:04:00
    BONUS LECTURE
    top