Udemy - The Complete Android Ethical Hacking Practical Course CAEHP [AhLaN]


Udemy - The Complete Android Ethical Hacking Practical Course CAEHP [AhLaN]
Category:
Date:
09/15/20 at 10:12am GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
1.5 GB in 99 files

Torrent Status:
  This torrent has been verified.

Infohash:
f11945bcb47997bc55c508b8d6d17a2df9b8440d


File list

  • Udemy - The Complete Android Ethical Hacking Practical Course CAEHP [AhLaN]
  • icon 1. Chapter 1/1. Best offer ( Use this Coupon for best Discount ).html 130 B
    icon 2. Introduction/1. Meet and Greet ...!!!.html 174 B
    icon 2. Introduction/10. what is F-Droid .mp4 5 MB
    icon 2. Introduction/11. Package Management.mp4 6.1 MB
    icon 2. Introduction/12. QA Session with instructor and various Social Media availability.html 1.2 KB
    icon 2. Introduction/2. Disclaimer and Note.html 878 B
    icon 2. Introduction/3. 5 Mins Reading Material Before we Start.html 696 B
    icon 2. Introduction/4. Introduction.mp4 5.4 MB
    icon 2. Introduction/4.1 What is Ethical Hacking .html 81 B
    icon 2. Introduction/5. Self Test.html 170 B
    icon 2. Introduction/6. What is Termux .mp4 17 MB
    icon 2. Introduction/7. What is Shell .mp4 3.9 MB
    icon 2. Introduction/8. Why Termux .mp4 10.5 MB
    icon 2. Introduction/9. Installation.mp4 5.2 MB
    icon 3. Termux Basics/1. Rate the Course.html 378 B
    icon 3. Termux Basics/10. Optional Reading Material Update Package Lists.html 1.1 KB
    icon 3. Termux Basics/11. apt-show.mp4 6.7 MB
    icon 3. Termux Basics/12. hidden files , versions and CD commands.mp4 6.6 MB
    icon 3. Termux Basics/13. Nano and Cat commands.mp4 9.6 MB
    icon 3. Termux Basics/14. PWD and touch command.mp4 10.4 MB
    icon 3. Termux Basics/15. mkdir command.mp4 6.1 MB
    icon 3. Termux Basics/16. use of cd command.mp4 7.4 MB
    icon 3. Termux Basics/17. use of mv command.mp4 17.6 MB
    icon 3. Termux Basics/18. use of rm command.mp4 7.3 MB
    icon 3. Termux Basics/19. mix use of cp , mv and touch command.mp4 7.1 MB
    icon 3. Termux Basics/2. Installing TERMUX from Google Play Store.mp4 12.5 MB
    icon 3. Termux Basics/20. use of uname command.mp4 4.1 MB
    icon 3. Termux Basics/21. use of ifconfig command.mp4 5.5 MB
    icon 3. Termux Basics/22. know your IP address.mp4 5.1 MB
    icon 3. Termux Basics/23. use of Ping command.mp4 2.7 MB
    icon 3. Termux Basics/24. use of chmod command.mp4 7.6 MB
    icon 3. Termux Basics/25. use of cal and proc command.mp4 15.9 MB
    icon 3. Termux Basics/26. use of git clone and wget command.mp4 17 MB
    icon 3. Termux Basics/27. Various Other Useful Commands.html 1.6 KB
    icon 3. Termux Basics/3. Storage Setup , Update and Upgrade Command.mp4 22 MB
    icon 3. Termux Basics/4. Why we use apt .mp4 29.3 MB
    icon 3. Termux Basics/5. apt Command in Linux.html 6 KB
    icon 3. Termux Basics/6. Remove Package.mp4 9.1 MB
    icon 3. Termux Basics/7. You can also download Hackers Keyboard from Google Play Store.html 730 B
    icon 3. Termux Basics/8. Package Management Basics apt, yum, dnf, pkg.html 1.5 KB
    icon 3. Termux Basics/9. Optional Reading Material for Knowledge Package Management Systems.html 3.9 KB
    icon 3205941_c6e6_2.jpg 81 KB
    icon 4. Metasploit Framework/1. Advanced TermuxLinux Commands Learning in the form of Quiz for Knowledge.html 170 B
    icon 4. Metasploit Framework/10. basic architecture of Metasploit.mp4 9 MB
    icon 4. Metasploit Framework/11. Module in Architecture of Metasploit.mp4 10.3 MB
    icon 4. Metasploit Framework/12. What is Shell , Bind Shell , Reverse Shell.mp4 10.4 MB
    icon 4. Metasploit Framework/13. Initial Steps , ways to Prevent these Attacks and Conclusion.mp4 15.3 MB
    icon 4. Metasploit Framework/14. READING Material What is Social Engineering .html 8.2 KB
    icon 4. Metasploit Framework/15. Social Engineering.html 170 B
    icon 4. Metasploit Framework/16. installation of CPU-Z.mp4 6.8 MB
    icon 4. Metasploit Framework/17. Optional Reading Material for CPU-Z.html 2.4 KB
    icon 4. Metasploit Framework/18. Metasploit Installation.mp4 104.2 MB
    icon 4. Metasploit Framework/19. Optional Reading Material for Installing the Metasploit in Termux.html 697 B
    icon 4. Metasploit Framework/2. What is Penetration Testing .mp4 12.8 MB
    icon 4. Metasploit Framework/20. alert for Database Server.mp4 2.1 MB
    icon 4. Metasploit Framework/21. Test the Metasploit Framework and learn what is MSFconsole.mp4 18.9 MB
    icon 4. Metasploit Framework/22. Help Command and Banner Command.mp4 13.3 MB
    icon 4. Metasploit Framework/23. Show Command ( no audio ).mp4 31.1 MB
    icon 4. Metasploit Framework/24. Show , Search Info , Use commands.mp4 37.1 MB
    icon 4. Metasploit Framework/25. Metasploit exploit over the LAN explaination.mp4 2.2 MB
    icon 4. Metasploit Framework/26. Reading Material of what is LAN i.e. LOCAL AREA NETWORK.html 1.5 KB
    icon 4. Metasploit Framework/27. complete exploit over the LAN.mp4 79.4 MB
    icon 4. Metasploit Framework/28. Reading Material What is WAN i.e. WIDE AREA NETWORK .html 1.2 KB
    icon 4. Metasploit Framework/29. Port Forwarding Demonstration with Data is Turned on along with hotspot (failed).mp4 45.6 MB
    icon 4. Metasploit Framework/3. Optional Advanced Understanding of Penetration Testing and its Stages.html 4.5 KB
    icon 4. Metasploit Framework/30. Hotspot Failure ( turning OFF again and again ).mp4 37.1 MB
    icon 4. Metasploit Framework/31. Getting confused with the LPORT while we are doing with WIFI.mp4 69.9 MB
    icon 4. Metasploit Framework/32. learning from our mistakes perfectly working this time with wifi ( no audio).mp4 63 MB
    icon 4. Metasploit Framework/33. Making our payload PERSISTENT.mp4 94.7 MB
    icon 4. Metasploit Framework/34. Metasploit Quiz.html 170 B
    icon 4. Metasploit Framework/4. Advanced Penetration Testing Questions to give you indepth knowledge.html 170 B
    icon 4. Metasploit Framework/5. What is Metasploit Framework and its History.mp4 12.7 MB
    icon 4. Metasploit Framework/6. Optional Reading Material for Metasploit Framework.html 3 KB
    icon 4. Metasploit Framework/7. Basic Terminologies Vulnerability.mp4 8.5 MB
    icon 4. Metasploit Framework/8. Basic Terminologies Exploit.mp4 11.8 MB
    icon 4. Metasploit Framework/9. Basic Terminologies Payload.mp4 10.3 MB
    icon 5. Protect your files with Encryption/1. What is encryption and decryption.mp4 10.5 MB
    icon 5. Protect your files with Encryption/2. Reading Material Difference between Encryption and Decryption.html 1.8 KB
    icon 5. Protect your files with Encryption/3. Tool1.mp4 19.2 MB
    icon 5. Protect your files with Encryption/4. OPTIONAL Reading Material The Rijndael Encryption Algorithm.html 6.5 KB
    icon 5. Protect your files with Encryption/5. Tool2.mp4 20.4 MB
    icon 5. Protect your files with Encryption/6. OPTIONAL Reading Material pkzip stream cipher algorithm.html 735 B
    icon 5. Protect your files with Encryption/7. Tool3 and what is salt explained.mp4 34.6 MB
    icon 5. Protect your files with Encryption/8. Tool3 Continued decryption.mp4 9.7 MB
    icon 5. Protect your files with Encryption/9. OPTIONAL Reading Material AES Algorithm.html 2.4 KB
    icon 6. Phishing Attack and how to Prevent Unknown Threats/1. Section Introduction.mp4 12.2 MB
    icon 6. Phishing Attack and how to Prevent Unknown Threats/2. What is Phishing Attack .mp4 9.7 MB
    icon 6. Phishing Attack and how to Prevent Unknown Threats/3. Mirroring Website.mp4 45.5 MB
    icon 6. Phishing Attack and how to Prevent Unknown Threats/4. Installing PHP and starting the Server in localhost with port number.mp4 30.1 MB
    icon 6. Phishing Attack and how to Prevent Unknown Threats/5. Generated the password in localhost.mp4 45.4 MB
    icon 6. Phishing Attack and how to Prevent Unknown Threats/6. Uploading files in webhosting platform.mp4 32.9 MB
    icon 6. Phishing Attack and how to Prevent Unknown Threats/7. Convert your website to an Android APP.mp4 35.5 MB
    icon 6. Phishing Attack and how to Prevent Unknown Threats/8. Advanced Phishing Attack Questions.html 170 B
    icon 7. How an attacker access your Front Camera/1. Know the Tool which attackers use to access the Camera.mp4 8.5 MB
    icon 7. How an attacker access your Front Camera/2. OPTIONAL READING Material.html 1.8 KB
    icon 7. How an attacker access your Front Camera/3. if SAYCHEESE is not cloning , try this one !.html 1.3 KB
    icon 7. How an attacker access your Front Camera/4. How to perform the attack.mp4 58.8 MB
    icon AhLaN.txt 961 B
    icon Seed Me!!.png 42 KB

Similar Torrents