Job Acceleration Program (JAP) |
|
Knowing JAP |
|
00:00:00 |
|
Elaborating JAP |
|
00:00:00 |
Chalo INDIA Startup Drive |
|
All About Chalo INDIA Startup Drive |
|
00:00:00 |
Introduction to Ethical Hacking |
|
Introduction to Ethical Hacking |
|
00:00:00 |
System Fundamentals |
|
Computer and its architecture |
|
00:00:00 |
|
Operating Systems |
|
00:00:00 |
|
Network and Services |
|
00:00:00 |
|
Ports and Port numbers |
|
00:00:00 |
|
Cloud Fundamentals |
|
00:00:00 |
|
Virtualization and its components |
|
00:00:00 |
|
AVODHA Official English YouTube Channel |
|
Unlimited |
|
A cybersecurity Primer |
|
00:00:00 |
|
Compliance and Audit |
|
00:00:00 |
Malwares |
|
Overview of Malware |
|
00:00:00 |
|
Viruses and Worms |
|
00:00:00 |
|
Ransomware and Crypto Malware |
|
00:00:00 |
|
Trojans and RATs |
|
00:00:00 |
|
Rootkits |
|
00:00:00 |
|
Keyloggers |
|
00:00:00 |
|
Adware and Spyware |
|
00:00:00 |
|
Bots and Botnets |
|
00:00:00 |
|
Logic Bombs |
|
00:00:00 |
Attacks |
|
Phishing |
|
00:00:00 |
|
Tailgating and Impersonation |
|
00:00:00 |
|
Dumpster Diving |
|
00:00:00 |
|
Shoulder Surfing |
|
00:00:00 |
|
Hoaxes |
|
00:00:00 |
|
Watering Hole Attacks |
|
00:00:00 |
|
Principles of Social Engineering |
|
00:00:00 |
|
Denial of Service |
|
00:00:00 |
|
Man in the middle |
|
00:00:00 |
|
Buffer Overflows |
|
00:00:00 |
|
Data Injection |
|
00:00:00 |
|
Cross site Scripting |
|
00:00:00 |
|
Cross site Request Forgery |
|
00:00:00 |
|
Privilege Escalation |
|
00:00:00 |
|
DNS Poisoning and Domain Hijacking |
|
00:00:00 |
|
Zero day attacks |
|
00:00:00 |
|
Replay Attacks |
|
00:00:00 |
|
Client Hijacking Attacks |
|
00:00:00 |
|
Driver Manipulation |
|
00:00:00 |
|
Spoofing |
|
00:00:00 |
|
Wireless Replay Attacks |
|
00:00:00 |
|
Rogue Access Points and Evil Twins |
|
00:00:00 |
|
Wireless Jamming |
|
00:00:00 |
|
WPS Attacks |
|
00:00:00 |
|
Bluejacking and Bluesnarfing |
|
00:00:00 |
|
RFID and NFC Attacks |
|
00:00:00 |
|
Wireless Disassociation Attacks |
|
00:00:00 |
Linux Basics |
|
What is Linux? |
|
00:00:00 |
|
Lab Setup |
|
00:00:00 |
|
lab setup Part 2 |
|
00:00:00 |
|
Building our own lab |
|
00:00:00 |
|
Getting Started |
|
00:00:00 |
|
Getting Started Part 2 |
|
00:00:00 |
|
Basic Commands of linux |
|
00:00:00 |
|
Files and the Filesystem |
|
00:00:00 |
|
Files and the Filesystem part2 |
|
00:00:00 |
|
Users and Groups |
|
00:00:00 |
|
Installing software |
|
00:00:00 |
|
Installing software part 2 |
|
00:00:00 |
|
Manually installing software |
|
00:00:00 |
|
Shells |
|
00:00:00 |
|
shells part 2 |
|
00:00:00 |
|
Shells part 3 |
|
00:00:00 |
|
More utilities |
|
00:00:00 |
|
more utilities part 2 |
|
00:00:00 |
|
more utilities part 3 |
|
00:00:00 |
|
Networking at Command line |
|
00:00:00 |
|
File transfer utilities |
|
00:00:00 |
|
Learning Linux Part – 1 |
|
00:00:00 |
|
Learning Linux Part – 2 |
|
Unlimited |
|
Learning Linux Quiz |
|
00:01:00 |
|
Building our Lab |
|
Unlimited |
|
Process management |
|
00:00:00 |
|
Process management part 2 |
|
00:00:00 |
|
Ethical Hacking Methodology |
|
Unlimited |
|
Latest lab setup |
|
00:00:00 |
Data Intelligence: |
|
Passive Information Gathering |
|
00:00:00 |
|
OSINT-Maltego |
|
00:00:00 |
|
OSINT-Recon |
|
00:00:00 |
|
OSINT-theHarvester |
|
00:00:00 |
|
OSINT-Shodan |
|
00:00:00 |
|
DNS-Enumeration |
|
00:00:00 |
|
DNS-Zone Transfer |
|
00:00:00 |
|
Google Dorks |
|
00:00:00 |
|
Google Dorks Quiz |
|
00:02:00 |
|
OSINT challenges 1 |
|
00:00:00 |
|
OSINT challenges 2 |
|
00:00:00 |
Networking Basics |
|
Networking – Electricity in Computing |
|
Unlimited |
|
Networking Layers |
|
Unlimited |
Scanning |
|
Introduction and NMAP |
|
00:00:00 |
|
NMAP Basic Scanning |
|
00:00:00 |
|
NMAP Multiple Targets |
|
00:00:00 |
|
TCP Connect Scan |
|
Unlimited |
|
Stealth Scan |
|
Unlimited |
|
ACK Probe |
|
Unlimited |
|
Service and OS detection |
|
Unlimited |
|
Aggressive Scanning |
|
Unlimited |
|
UDP Scanning |
|
Unlimited |
|
Scanning Quiz-1 |
|
00:02:00 |
|
NMAP Output |
|
Unlimited |
|
Docker |
|
Unlimited |
|
Webmap |
|
Unlimited |
|
Introduction to Scripting |
|
Unlimited |
Vulnerability Assessment |
|
Introduction to Vulnerability |
|
Unlimited |
|
VALC – Vulnerability Assessment Life Cycle |
|
Unlimited |
|
Using NMAP to find Vulnerability |
|
Unlimited |
Nessus |
|
Nessus |
|
Unlimited |
Exploitation |
|
Introduction to Exploitation |
|
Unlimited |
|
Manual Exploitation |
|
Unlimited |
|
Reverse Shell and Bind shell |
|
Unlimited |
|
Staged and Non-Staged Payloads |
|
Unlimited |
|
Automatic Exploitation |
|
Unlimited |
Steganography |
|
Introduction to Steganography |
|
Unlimited |
|
Technical Steganography |
|
Unlimited |
|
Linguistic Steganography |
|
Unlimited |
|
Hiding message using Steganography |
|
Unlimited |
|
Password Cracking |
|
Unlimited |
|
Active online attack |
|
Unlimited |
|
Offline attack |
|
Unlimited |
|
Steganography and Password Cracking Challenge |
|
Unlimited |
|
ACK Quiz – Internet Research Quiz |
|
00:01:00 |
Shell Scripting |
|
Introduction to Shell Scripting |
|
Unlimited |
|
Text Editor |
|
Unlimited |
|
Naming & Permission of Shell Script |
|
Unlimited |
|
Shell Scripting – Hello World |
|
Unlimited |
|
Shell Scripting – Why? |
|
Unlimited |
|
User Defined Variables |
|
Unlimited |
|
System Variables |
|
Unlimited |
|
Command Line Argument |
|
Unlimited |
|
Read Command |
|
Unlimited |
|
Command Substitution |
|
Unlimited |
|
For Loop |
|
Unlimited |
|
Functions |
|
Unlimited |
|
While Loop |
|
Unlimited |
|
Until Loop |
|
Unlimited |
|
If Else Condition |
|
Unlimited |
|
Case Statement |
|
Unlimited |
|
Bash Debugging |
|
Unlimited |
|
Python Scripting 1 |
|
00:00:00 |
|
Doppelg��nger Domain |
|
Unlimited |
Social Engineering |
|
Introduction to Social Engineering |
|
Unlimited |
|
Relevance of Social Engineering |
|
Unlimited |
|
Human Based Social Engineering |
|
Unlimited |
|
Computer Based Social Engineering |
|
Unlimited |
|
Phishing |
|
Unlimited |
|
Mobile Based Social Engineering |
|
Unlimited |
Web Application Pentesting |
|
Introduction to Web App Pentesting |
|
Unlimited |
|
Spidering and Fuzzing with ZAP |
|
00:00:00 |
|
Bug Hunting Platforms |
|
Unlimited |
|
Introduction to recon |
|
Unlimited |
|
Enumerating Subdomains – Sublist3r |
|
Unlimited |
|
Enumerating Subdomains – Assetfinder |
|
Unlimited |
|
Finding Live Domains |
|
Unlimited |
|
Sorting Live Subdomains |
|
Unlimited |
|
Enumerating Subdomains – Gobuster |
|
Unlimited |
|
Subdomain & X-Request QUIZ |
|
00:02:00 |
|
Web challenges 1 |
|
00:00:00 |
|
PHP Code Injection Lab |
|
00:00:00 |
|
Practical SQL injection |
|
00:00:00 |
OWASP |
|
Introduction to OWASP Top 10 |
|
00:00:00 |
|
Injection |
|
00:00:00 |
|
Manual SQL Injection |
|
00:00:00 |
|
Configuring Burpsuite |
|
00:00:00 |
|
Automated SQL Injection |
|
00:00:00 |
|
Command Injection |
|
00:00:00 |
|
Injection prevention |
|
00:00:00 |
|
Broken Authentication |
|
00:00:00 |
|
Credential Stuffing |
|
00:00:00 |
|
Sensitive Data Exposure |
|
00:00:00 |
|
Sensitive Data Exposure- Prevention |
|
00:00:00 |
|
XML External Entities (XXE) |
|
00:00:00 |
|
Insecure Direct Object Reference (IDOR) |
|
00:00:00 |
|
Security Misconfiguration |
|
00:00:00 |
|
Security Misconfiguration |
|
00:00:00 |
|
Cross Site Scripting |
|
00:00:00 |
|
XSS Exploitation |
|
00:00:00 |
|
Insecure Deserialization |
|
00:00:00 |
|
Using Components with Known vulnerabilities |
|
00:00:00 |
|
Insufficient Logging and Monitoring |
|
00:00:00 |
|
Clickjacking |
|
00:00:00 |
|
Broken Link Hijacking |
|
00:00:00 |
|
Cross Site Request Forgery (CSRF) |
|
00:00:00 |
|
No Rate limiting |
|
00:00:00 |
|
HSTS |
|
00:00:00 |
|
Server Side Request Forgery(SSRF) |
|
00:00:00 |
|
Subdomain Takeover |
|
Unlimited |
|
Report Writing |
|
Unlimited |
Cryptography |
|
Introduction to Cryptography |
|
00:00:00 |
|
Objectives of Cryptography |
|
00:00:00 |
|
Types of cryptography |
|
00:00:00 |
|
Encoding & Decoding |
|
00:00:00 |
|
symetric key encryption |
|
00:00:00 |
|
WORKING OF DES |
|
00:00:00 |
|
Cryptanalysis |
|
00:00:00 |
|
SSH |
|
00:00:00 |
|
Hashing |
|
00:00:00 |
|
Checking File Integritiy |
|
00:00:00 |
|
Crpytanalysis_practical |
|
00:00:00 |
|
Disk Encryption |
|
00:00:00 |
|
ssl |
|
00:00:00 |
WEB PRESENCE |
|
Network Insecurity |
|
00:00:00 |
|
Sniffing & Spoofing |
|
00:00:00 |
|
Spoofing, crypto, and wifi |
|
00:00:00 |
|
DEMO – tcpdump |
|
00:00:00 |
Android Pentesting |
|
Introduction to Android |
|
00:00:00 |
|
Android Architecture |
|
00:00:00 |
|
Connecting a Wireless Adapter To Kali |
|
00:00:00 |
|
Android App Structure Intents |
|
00:00:00 |
|
Android App Structure-Broadcast Receive |
|
00:00:00 |
Lab Setup |
|
Setting up Genymotion |
|
00:00:00 |
|
Connecting Genymotion with Burpsuite |
|
00:00:00 |
|
Jadx setup |
|
00:00:00 |
|
Drozer Setup |
|
00:00:00 |
|
Shell Scripting Quiz |
|
00:02:00 |
OWASP Top 10 |
|
M1: Improper Platform Usage |
|
00:00:00 |
|
M2: Insecure Data Storage |
|
00:00:00 |
|
M3: Insecure Communication |
|
00:00:00 |
|
M4: Insecure Authentication |
|
00:00:00 |
|
M5: Insufficient Cryptography |
|
00:00:00 |
|
M6: Insecure Authorization |
|
00:00:00 |
|
M7: Client Code Quality |
|
00:00:00 |
|
M8: Code Tampering |
|
00:00:00 |
|
M10: Extraneous Functionality |
|
00:00:00 |
|
Reversing APK |
|
00:00:00 |
|
Reversing APK |
|
00:00:00 |
|
Ethical Hacking OWASP Quiz |
|
00:02:00 |
|
Hardcording Issues |
|
00:00:00 |
|
MobSF setup |
|
00:00:00 |
|
MobSF Static analysis |
|
00:00:00 |
Dynamic Analysis |
|
Dynamic Analysis using Logcat |
|
00:00:00 |
|
Dynamic Analysis using Drozer (SQL Injection) |
|
00:00:00 |
|
Dynamic analysis using MobSF |
|
00:00:00 |
|
Quiz – 1 |
|
00:04:00 |
NETWORK PENTESTING |
|
Introduction to Network Pentesting |
|
00:00:00 |
|
Network Basics |
|
00:00:00 |
|
Information Gathering |
|
00:00:00 |
|
Information gathering 2 |
|
00:00:00 |
|
Information gathering 3 |
|
00:00:00 |
|
Active Information gathering |
|
00:00:00 |
|
Active Information gathering lab |
|
00:00:00 |
|
What is MAC Address & How To Change It |
|
00:00:00 |
|
CTF 1 |
|
00:00:00 |
|
CTF 2 |
|
00:00:00 |
|
CTF 3 |
|
00:00:00 |
|
CTF 4 |
|
00:00:00 |
|
CTF 5 |
|
00:00:00 |
|
CTF 6 |
|
00:00:00 |
|
CTF 6 Part 2 |
|
00:00:00 |
|
CTF 7 |
|
00:00:00 |
|
CTF 7 Part2 |
|
00:00:00 |
|
CTF 8 |
|
00:00:00 |
|
CTF 8 part2 |
|
00:00:00 |
|
CTF 9 |
|
00:00:00 |
|
CTF9 Part2 |
|
00:00:00 |
|
CTF 10 |
|
00:00:00 |
|
CTF 10 Part 2 |
|
00:00:00 |
|
CTF 10 part 3 |
|
00:00:00 |
|
LINUX boxes 1 |
|
00:00:00 |
|
Linux Boxes 1 part 2 |
|
00:00:00 |
|
LINUX boxes 2 |
|
00:00:00 |
|
LINUX Boxes 2 part 2 |
|
00:00:00 |
|
LINUX boxes 3 |
|
00:00:00 |
|
LINUX boxes 3 part 2 |
|
00:00:00 |
|
LINUX boxes 3 part 3 |
|
00:00:00 |
|
LINUX boxes 4 |
|
00:00:00 |
|
LINUX boxes 4 part 2 |
|
00:00:00 |
|
LINUX boxes 4 part 3 |
|
00:00:00 |
|
LINUX boxes 5 |
|
00:00:00 |
|
LINUX boxes 5 part 2 |
|
00:00:00 |
|
LINUX boxes 5 part 3 |
|
00:00:00 |
|
LINUX boxes 6 |
|
00:00:00 |
|
LINUX boxes 6 part 2 |
|
00:00:00 |
|
LINUX boxes 7 |
|
00:00:00 |
|
LINUX boxes 7 part 2 |
|
00:00:00 |
|
LINUX boxes 7 part 3 |
|
00:00:00 |
|
LINUX boxes 8 |
|
00:00:00 |
|
LINUX boxes 8 part 2 |
|
00:00:00 |
|
LINUX boxes 9 |
|
00:00:00 |
|
LINUX boxes 9 part 2 |
|
00:00:00 |
|
LINUX boxes 9 part 3 |
|
00:00:00 |
|
LINUX boxes 10 |
|
00:00:00 |
|
LINUX boxes 10 part 2 |
|
00:00:00 |
|
LINUX boxes 10 part3 |
|
00:00:00 |
|
Windows Boxes 1 |
|
00:00:00 |
|
Networking Quiz |
|
00:02:00 |
Active Directory |
|
Introduction to Active Directory |
|
00:00:00 |
|
Wreath 1-4 |
|
00:00:00 |
|
AD 1 nmap |
|
00:00:00 |
|
AD 1 Recon |
|
00:00:00 |
|
AD 1 getting a shell |
|
00:00:00 |
|
AD 1 Enumeration |
|
00:00:00 |
|
AD 1 Getting the Root |
|
00:00:00 |
|
RED TEAM Engagement |
|
00:00:00 |
|
RED TEAM Engagement part 2 |
|
00:00:00 |
|
RED TEAM Engagement part 3 |
|
00:00:00 |
|
Red Team Intelligence |
|
00:00:00 |
|
Red Team Operation security |
|
00:00:00 |
|
Practical C2 |
|
00:00:00 |
|
HTB Support Part 1 |
|
00:00:00 |
|
HTB Support Part 2 |
|
00:00:00 |
|
Windows management instrumentation |
|
00:00:00 |
|
Windows management instrumentation 2 |
|
00:00:00 |
|
Binary Exploitation |
|
00:00:00 |
|
OSI & TCP/IP Model |
|
00:00:00 |
|
Network Devices |
|
00:00:00 |
|
Interfaces and Cables |
|
00:00:00 |
|
VLAN Part 2 Lab |
|
00:00:00 |
|
Connecting Devices LAB |
|
00:00:00 |
|
Command Injection – Looking glass |
|
00:00:00 |
|
Cookie manipulation – Baby Auth |
|
00:00:00 |
|
Weak nginx config- Baby nginxatsu |
|
00:00:00 |
|
XML External Entity Injection – baby WAFfiles Order |
|
00:00:00 |
|
Broken Authentication -Console |
|
00:00:00 |
|
Improper Error Handling – Baby BoneChewerCon |
|
00:00:00 |
|
XSS- Full Stack Conf |
|
00:00:00 |
|
Foothold of Kernel Exploit – Devel |
|
00:00:00 |
|
Hacking the Enterprise Network Part 1 |
|
00:00:00 |
|
Kernal Explot – Privesc |
|
00:00:00 |
|
OWASP TOP TEN – Broken Access Control |
|
00:00:00 |
|
RastaLabs – Password Spraying |
|
00:00:00 |
|
Dante – Enterprise WordPress Hacking |
|
00:00:00 |
|
Broken Access control – IDOR |
|
00:00:00 |
|
OWASP Top 10- Cryptographic Failure |
|
00:00:00 |
|
Cryptographic Failure – HTTP |
|
00:00:00 |
|
Broken Access Control: User ID controlled by request parameter |
|
00:00:00 |
|
Broken access control- with unpredictable user IDs |
|
00:00:00 |
|
Broken access control – request parameter with data leakage in redirect |
|
00:00:00 |
|
Broken access control – Password Disclosure |
|
00:00:00 |
|
Dante – Web to Root |
|
00:00:00 |
|
URL Based Access Control |
|
00:00:00 |
|
No access control on one step |
|
Unlimited |
|
Method Based Access Control |
|
00:00:00 |
|
No access control on one step |
|
00:00:00 |
|
Enumeration With Powerview and ADModule |
|
00:00:00 |
|
Referer Based Access Control |
|
00:00:00 |
|
Enumeration – OUs and GPOs |
|
00:00:00 |
|
Enumeration with ACL for Domain Rights/Permissions |
|
00:00:00 |
|
Enumeration of Trust in Forest |
|
00:00:00 |
|
Broken Access Control – Final Test |
|
00:00:00 |
BONUS LECTURE |
FINAL TEST- Ethical Hacking in English
5 days
|
Congrats ! Submit the course completion form. |
|
00:00:00 |
|
OWASP TOP 10 – XSS |
|
00:00:00 |
|
Config Kali for API |
|
00:00:00 |
|
AD local Priv to Adminsrv |
|
00:00:00 |
|
Topology – Latrex Injection |
|
00:00:00 |