• No products in the cart.

Course Curriculum

Introduction To Ethical Hacking
Introduction to Ethical Hacking 00:00:00
Information Security Overview 00:00:00
Hacking Concepts 00:00:00
Ethical Hacking Concepts 00:00:00
Information Security Controls 00:00:00
Information Security Laws and Standards 00:00:00
Job Acceleration Program (JAP)
Knowing JAP 00:00:00
Elaborating JAP 00:00:00
Chalo INDIA Startup Drive
All about Chalo India Startup Drive 00:00:00
Footprinting and Reconnaissance
Footprinting Concepts 00:00:00
Footprinting through Search Engines 00:00:00
Footprinting tools. 00:00:00
Footprinting through Web Services 00:00:00
Footprinting through Social Networking Sites 00:00:00
Website Footprinting 00:00:00
Email Footprinting 00:00:00
Whois Footprinting 00:00:00
DNS Footprinting 00:00:00
Footprinting through Social Engineering 00:00:00
Footprinting Countermeasures 00:00:00
Network footprinting 00:00:00
Scanning Networks
Network Scanning Concepts 00:00:00
Scanning Tools 00:00:00
Host Discovery 00:00:00
Port and Service Discovery 00:00:00
OS Discovery (Banner Grabbing/OS Fingerprinting) 00:00:00
Scanning Beyond IDS and Firewall 00:00:00
Draw Network Diagrams 00:00:00
AVODHA Official Telugu YouTube Channel 00:00:00
Enumeration
Enumeration Concepts 00:00:00
NetBIOS Enumeration 00:00:00
SNMP Enumeration 00:00:00
LDAP Enumeration 00:00:00
SMTP and DNS Enumeration 00:00:00
NTP and NFS Enumeration 00:00:00
Other Enumeration Techniques 00:00:00
Enumeration Countermeasures 00:00:00
Vulnerability Analysis
Vulnerability Assessment Concepts 00:00:00
Vulnerability Classification and Assessment Types 00:00:00
Vulnerability Assessment Solutions and Tools 00:00:00
Vulnerability Assessment Reports 00:00:00
System Hacking
System Hacking Concepts 00:00:00
Gaining Access 00:00:00
Escalating Privileges 00:00:00
Maintaining Access 00:00:00
Clearing Logs 00:00:00
Malware Threats
Malware Concepts 00:00:00
APT Concepts 00:00:00
Trojan Concepts 00:00:00
Virus and Worm Concepts 00:00:00
Malware Analysis 00:00:00
Countermeasures 00:00:00
Denial-Of-Service
DoS/DDoS Concepts 00:00:00
DoS/DDoS Attack Techniques 00:00:00
Botnets 00:00:00
DDoS Case Study 00:00:00
DoS/DDoS Protection Tools 00:00:00
Counter-measures 00:00:00
DoS/DDoS Attack Tools 00:00:00
Setting Up A Hacking Lab
Initial Preparation 00:00:00
Installing Kali Linux as a VM on Windows 00:00:00
Social Engineering
Social Engineering Concepts 00:00:00
Social Engineering Techniques 00:00:00
Insider Threats 00:00:00
Countermeasures 00:00:00
Sniffing
Sniffing Concepts 00:00:00
Sniffing Techniques 00:00:00
Sniffing Tools 00:00:00
Countermeasures 00:00:00
Sniffing Detection Techniques 00:00:00
Session Hijacking
Session Hijacking Concepts 00:00:00
Application Level Session Hijacking 00:00:00
Network Level Session Hijacking 00:00:00
Session Hijacking Tools 00:00:00
Countermeasures 00:00:00
SQL Injection
SQL Injection Concepts 00:00:00
Types of SQL Injection 00:00:00
SQL Injection Methodology 00:00:00
SQL Injection Tools 00:00:00
Networking Basics
Networking ļæ½ļæ½ļæ½ Electricity in Computing 00:00:00
Networking Layers 00:00:00
Linux Basics
Learning Linux Part ļæ½ļæ½ļæ½ 1 00:00:00
Learning Linux Part ļæ½ļæ½ļæ½ 2 00:00:00
Building our Lab 00:00:00
Ethical Hacking Methodology 00:00:00
Data Intelligence
Passive Information Gathering 00:00:00
OSINT-Maltego 00:00:00
OSINT-Recon 00:00:00
OSINT-the Harvester 00:00:00
OSINT-Shodan 00:00:00
DNS-Enumeration 00:00:00
Google Dorks 00:00:00
DNS-Zone Transfer 00:00:00
Scanning
Introduction and NMAP 00:00:00
NMAP Basic Scanning 00:00:00
NMAP Multiple Targets 00:00:00
TCP Connect Scan 00:00:00
Stealth Scan 00:00:00
ACK Probe 00:00:00
Service and OS detection 00:00:00
Aggressive Scanning 00:00:00
UDP Scanning 00:00:00
NMAP Output 00:00:00
Docker 00:00:00
Webmap 00:00:00
Introduction to Shell Scripting 00:00:00
Vulnerability Assessment
Introduction to Vulnerability 00:00:00
VALC ļæ½ļæ½ļæ½ Vulnerability Assessment Life Cycle 00:00:00
Using NMAP to find Vulnerability 00:00:00
Nessus
Nessus 00:00:00
Exploitation
Introduction to Exploitation 00:00:00
Manual Exploitation 00:00:00
Reverse Shell and Bind shell 00:00:00
Staged and Non-Staged Payloads 00:00:00
Automatic Exploitation 00:00:00
Steganography
Introduction to Steganography 00:00:00
Technical Steganography 00:00:00
Linguistic Steganography 00:00:00
Hiding message using Steganography 00:00:00
Password Cracking 00:00:00
Active online track 00:00:00
Offline attack 00:00:00
Steganography and Password Cracking Challenge 00:00:00
Shell Scripting
Introduction to Shell Scripting 00:00:00
Text Editor 00:00:00
Naming & Permission of Shell Script 00:00:00
Shell Scripting ā€“ Hello World 00:00:00
Shell Scripting ā€“ Why? 00:00:00
User Defined Variables 00:00:00
System Variables 00:00:00
Command Line Argument 00:00:00
Read Command 00:00:00
Command Substitution 00:00:00
For Loop 00:00:00
Functions 00:00:00
While Loop 00:00:00
Until Loop 00:00:00
If Else Condition 00:00:00
Case Statement 00:00:00
Bash Debugging 00:00:00
Social Engineering
Introduction to Social Engineering 00:00:00
Relevance of Social Engineering 00:00:00
Human Based Social Engineering 00:00:00
Computer Based Social Engineering 00:00:00
Phishing 00:00:00
Mobile Based Social Engineering 00:00:00
Doppelgļæ½ļæ½nger Domain 00:00:00
Web Application Pentesting
Introduction to Web App Pentesting 00:00:00
Bug Hunting Platforms 00:00:00
Introduction to recon 00:00:00
Enumerating Subdomains ļæ½ļæ½ļæ½ Sublist3r 00:00:00
Enumerating Subdomains ļæ½ļæ½ļæ½ Assetfinder 00:00:00
Finding Live Domains 00:00:00
Sorting Live Subdomains 00:00:00
Enumerating Subdomains ļæ½ļæ½ļæ½ Gobuster 00:00:00
OWASP
Introduction to OWASP Top 10 00:00:00
Injection 00:00:00
Manual SQL Injection 00:00:00
Configuring Burpsuite 00:00:00
Automated SQL Injection 00:00:00
Command Injection 00:00:00
Injection prevention 00:00:00
Broken Authentication 00:00:00
Credential Stuffing 00:00:00
Sensitive Data Exposure 00:00:00
Sensitive Data Exposure- Prevention 00:00:00
XML External Entities (XXE) 00:00:00
Insecure Direct Object Reference (IDOR) 00:00:00
Security Misconfiguration 00:00:00
Broken Access Control 00:00:00
Cross Site Scripting 00:00:00
XSS Exploitation 00:00:00
Insecure Deserialization 00:00:00
Using Components with Known vulnerabilities 00:00:00
Insufficient Logging and Monitoring 00:00:00
Clickjacking 00:00:00
Broken Link Hijacking 00:00:00
Cross Site Request Forgery (CSRF) 00:00:00
No Rate limiting 00:00:00
HSTS 00:00:00
Server Side Request Forgery(SSRF) 00:00:00
Report Writing 00:00:00
Cryptography
Introduction to Cryptography 00:00:00
Objectives of Cryptography 00:00:00
Types of cryptography 00:00:00
Encoding & Decoding 00:00:00
symetric key encryption 00:00:00
WORKING OF DES 00:00:00
Cryptanalysis 00:00:00
SSH 00:00:00
Hashing 00:00:00
Checking File Integritiy 00:00:00
Crpytanalysis_practical 00:00:00
Disk Encryption 00:00:00
ssl 00:00:00
WEB PRESENCE
Network Insecurity 00:00:00
Sniffing & Spoofing 00:00:00
Spoofing, crypto, and wifi 00:00:00
DEMO ļæ½ļæ½ļæ½ tcpdump 00:00:00
NETWORK PENTESTING
Introduction to Network Pentesting 00:00:00
Network Basics 00:00:00
Connecting a Wireless Adapter To Kali 00:00:00
What is MAC Address & How To Change It 00:00:00
Android Pentesting
Introduction to Android 00:00:00
Android Architecture 00:00:00
Android App Structure Intents 00:00:00
Android App Structure-Broadcast Receive 00:00:00
Lab Setup
Setting up Genymotion 00:00:00
Connecting Genymotion with Burpsuite 00:00:00
Jadx setup 00:00:00
Drozer Setup 00:00:00
QUIZ SECTION
QUIZ 2 – Footprinting and Reconnaissance 00:04:00
QUIZ 3 – Scanning Networks 00:04:00
QUIZ 4 – Vulnerability Analysis 00:04:00
Quiz 00:05:00
Learning Linux Quiz 00:15:00
ACK Quiz ā€“ Internet Research Quiz 00:00:00
Scanning Quiz-1 00:05:00
ENUMERATION QUIZ 00:15:00
Google Dorks Quiz 00:15:00
Ā  Steganography and Password Cracking Challenge In Telugu 12:00:00
Shell Scripting Quiz 00:05:00
Create Shell Script for Recon 12:00:00
Subdomain & X-Request QUIZ 00:10:00
Ethical Hacking OWASP Quiz 00:10:00
CRACK THE VM 00:00:00
Quiz – 1 00:04:00
BONUS SECTION
FINAL TEST Unlimited
Congrats ! Submit the course completion form. 00:00:00
top