• LOGIN
  • No products in the cart.

Course Curriculum

Introduction to Ethical Hacking
Introduction to Ethical Hacking 00:29:00
Kali Linux Installation 00:05:03
Job Acceleration Program (JAP)
Knowing JAP 00:04:27
Elaborating JAP 00:10:46
Networking Basics
Networking – Electricity in Computing 00:47:00
Networking Layers 00:24:00
Networking Quiz 00:10:00
Chalo INDIA Startup Drive
All About Chalo INDIA Startup Drive 00:03:50
AVODHA Official Malayalam YouTube Channel 00:00:45
Linux Basics
Learning Linux Part – 1 00:22:00
Learning Linux Part – 2 00:32:00
Learning Linux Quiz 00:01:00
Building our Lab 00:36:11
Ethical Hacking Methodology 00:19:00
Data Intelligence
Passive Information Gathering 00:27:00
OSINT-Maltego 00:30:00
OSINT-Recon 00:31:00
OSINT-theHarvester 00:12:00
OSINT-Shodan 00:17:00
DNS-Enumeration 00:16:00
DNS-Zone Transfer 00:14:00
Google Dorks 00:20:00
Dare & Milestones 3 months
Scanning
Introduction and NMAP 00:12:00
NMAP Basic Scanning 00:15:52
NMAP Multiple Targets 00:10:38
TCP Connect Scan 00:14:37
Stealth Scan 00:10:00
ACK Probe 00:15:00
ACK Quiz – Internet Research Quiz 00:01:00
Service and OS detection 00:15:54
Aggressive Scanning 00:21:00
UDP Scanning 00:14:00
NMAP Output 00:14:00
Scanning Quiz-1 00:02:00
Docker 00:10:00
Webmap 00:20:00
Introduction to Scripting 00:18:00
Google Dorks Quiz 00:02:00
Vulnerability Assessment
Introduction to Vulnerability 00:20:00
VALC – Vulnerability Assessment Life Cycle 00:17:00
Using NMAP to find Vulnerability 00:17:00
Nessus
Nessus 00:24:00
Exploitation
Introduction to Exploitation 00:07:00
Exploitation Box 00:00:00
Manual Exploitation 00:20:04
Reverse Shell and Bind shell 00:16:34
Staged and Non-Staged Payloads 00:09:00
Automatic Exploitation 00:28:00
Steganography
Introduction to Steganography 00:05:00
Technical Steganography 00:06:00
Linguistic Steganography 00:07:53
Hiding message using Steganography 00:09:00
Password Cracking 00:10:00
Active online attack 00:11:00
Offline attack 00:17:00
Steganography and Password Cracking Challenge 00:03:54
Shell Scripting
Introduction to Shell Scripting 00:11:00
Text Editor 00:09:00
Naming & Permission of Shell Script 00:12:00
Shell Scripting – Hello World 00:06:00
Shell Scripting – Why? 00:08:00
User Defined Variables 00:06:00
System Variables 00:06:00
Command Line Argument 00:08:00
Read Command 00:08:00
Command Substitution 00:08:00
For Loop 00:08:00
Functions 00:04:36
While Loop 00:17:00
Until Loop 00:04:00
If Else Condition 00:22:00
Case Statement 00:28:00
Bash Debugging 00:05:00
Shell Scripting Quiz 00:02:00
Social Engineering
Introduction to Social Engineering 00:06:00
Relevance of Social Engineering 00:05:00
Human Based Social Engineering 00:03:39
Computer Based Social Engineering 00:02:32
Phishing 00:10:00
Mobile Based Social Engineering 00:07:00
Doppelgänger Domain 00:03:00
Web Application Pentesting
Introduction to Web App Pentesting 00:05:00
Bug Hunting Platforms 00:12:00
Introduction to recon 00:03:00
Enumerating Subdomains – Sublist3r 00:19:00
Enumerating Subdomains – Assetfinder 00:06:00
Finding Live Domains 00:09:00
Sorting Live Subdomains 00:22:00
Enumerating Subdomains – Gobuster 00:23:00
OWASP
Introduction to OWASP Top 10 00:05:00
Injection 00:04:00
Manual SQL Injection 00:12:00
Configuring Burpsuite 00:12:00
Automated SQL Injection 00:13:00
Command Injection 00:03:00
Injection prevention 00:07:00
Broken Authentication 00:05:00
Credential Stuffing 00:12:00
Broken Authentication – Prevention 00:03:00
Sensitive Data Exposure 00:04:00
Sensitive Data Exposure- Prevention 00:02:00
XML External Entities (XXE) 00:09:00
Insecure Direct Object Reference (IDOR) 00:12:00
Security Misconfiguration 00:06:00
Broken Access Control 00:08:00
Cross Site Scripting 00:03:00
XSS Exploitation 00:22:00
Insecure Deserialization 00:11:00
Using Components with Known vulnerabilities 00:02:00
Insufficient Logging and Monitoring 00:05:00
Clickjacking 00:18:00
Broken Link Hijacking 00:18:00
Cross Site Request Forgery (CSRF) 00:16:00
No Rate limiting 00:27:00
HSTS 00:04:00
Server Side Request Forgery(SSRF) 00:07:00
Subdomain Takeover 00:28:00
Subdomain & X-Request QUIZ 00:02:00
Report Writing 00:07:33
Ethical Hacking OWASP Quiz 00:02:00
HI ,THIS IS THE NEW CHALLENGE CRACK THE VM 00:01:04
Web Application Pentest
Introduction 00:08:53
Xampp Installation 00:14:25
Lab Configuration 00:04:49
Hackbar Installation 00:02:43
SQL Injection 00:28:06
XSS 00:01:56
Reflected XSS 00:10:34
Stored XSS 00:06:05
HTML Injection 00:04:11
Reflected HTML Injection 00:07:27
Stored HTML Injection 00:10:30
CSRF 00:19:05
SSRF 00:20:41
File Upload 00:11:41
LFI 00:10:18
RFI 00:12:31
Command Injection 00:10:43
Sensitive Information Exposure 00:01:41
Sensitive Information Exposure (Level 1) 00:04:39
Sensitive Information Exposure (Level 2) 00:09:11
No Rate Limit 00:15:03
IDOR 00:05:51
Broken Access Control 00:12:43
Broken Authentication 00:13:17
Parameter Tampering 00:05:49
Security Misconfiguration 00:03:28
Open Redirect 00:08:56
Host Header Injection 00:08:17
Insecure Deserialization 00:25:37
Final Conclusion 00:02:35
Windows .Net Reverse Engineering
Setting Lab 00:08:18
Downloading Necessary Softwares And Tools 00:16:53
Patching Level 1 Crackme 00:18:51
Patching Level 2 Crackme 00:17:33
Patching Level 3 Crackme 00:11:53
Patching Level 4 Crackme 00:09:43
Patching Level 5 Crackme 00:13:32
Patching Level 6 Crackme 00:15:35
Patching Level 7 Crackme 00:10:41
Patching Level 8 Crackme 00:08:45
Patching Level 9 Crackme 00:16:55
Patching Level 10 Crackme 00:21:03
Conclusion 00:01:46
Cryptography
Introduction to Cryptography 00:03:26
Objectives of Cryptography 00:07:47
Types of cryptography 02:51:00
Encoding & Decoding 00:11:25
symetric key encryption 00:04:29
WORKING OF DES 00:12:24
ASYMMETRIC KEY CRYPTOGRAPHY 00:03:48
E-MAIL ENCRYPTION 00:12:22
Hashing 00:25:27
Checking File Integritiy 00:06:27
SSH 00:06:08
Cryptanalysis 00:01:44
ssl 00:11:50
Crpytanalysis_practical 00:04:00
Disk Encryption 00:06:23
WEB PRESENCE
Network Insecurity 00:02:06
Sniffing & Spoofing 00:06:08
Spoofing, crypto, and wifi 00:05:17
DEMO – tcpdump 00:10:27
NETWORK PENTESTING
Introduction to Network Pentesting 00:02:45
Network Basics 00:04:33
Connecting a Wireless Adapter To Kali 00:06:44
What is MAC Address & How To Change It 00:10:46
Android Pentesting
Introduction to Android 00:11:52
Android Architecture 00:08:36
Android App Structure Intents 00:05:56
Android App Structure-Broadcast Receive 00:03:51
Lab Setup
Setting up Genymotion 00:11:53
Connecting Genymotion with Burpsuite 00:10:45
Jadx setup 00:06:46
Drozer Setup 00:11:24
OWASP Top 10
M1: Improper Platform Usage 00:05:08
M2: Insecure Data Storage 00:02:07
M3: Insecure Communication 00:02:46
M4: Insecure Authentication 00:02:21
M5: Insufficient Cryptography 00:01:56
M6: Insecure Authorization 00:02:11
M7: Client Code Quality 00:02:11
M8: Code Tampering 00:01:49
M10: Extraneous Functionality 00:02:08
Reversing APK -1 00:04:45
Reversing APK-2 00:02:02
Static Analysis
Hardcording Issues 00:15:44
MobSF setup 00:05:58
MobSF Static analysis 00:09:52
Dynamic Analysis
Dynamic Analysis using Logcat 00:04:01
Dynamic Analysis using Drozer (SQL Injection) 00:15:36
No rate Limiting attack 00:09:11
Dynamic analysis using MobSF 00:07:21
Learning Linux Quiz In Malayalam 00:01:00
Networking Quiz In Malayalam 00:02:00
ACK Quiz – Internet Research Quiz In Malayalam 00:01:00
Scanning Quiz-1 In Malayalam 00:02:00
Google Dorks Quiz In Malayalam 00:02:00
Editing Strings 00:09:27
Shell Scripting Quiz In Malayalam 00:02:00
Subdomain & X-Request QUIZ In Malayalam 00:02:00
Ethical Hacking OWASP Quiz In Malayalam 00:02:00
BONUS SECTION
FINAL TEST -Ethical Hacking in Malayalam Unlimited
Congrats ! Submit the course completion form. 00:00:00
top