dots bg

Master Ethical Hacking

The Master Ethical Hacking course is designed to provide in-depth knowledge and practical skills necessary for identifying and addressing security vulnerabilities in systems, networks, and applications. The course covers topics such as penetration testing, network security, cryptography, web application security, and ethical hacking tools and techniques. Students will learn how to conduct security assessments, safeguard digital assets, and protect against cyber threats. By the end of the course, learners will be equipped to pursue roles like ethical hacker, penetration tester, security consultant, or network security administrator in a rapidly growing field.

Course Instructor MYB

₹1899.00

dots bg

Course Overview

Schedule of Classes

Course Curriculum

1 Subject

Master Ethical Hacking

144 Learning Materials

S01- Introduction and installation!

section1vid1 Before We Begin.mp4

Video
4:43

section1vid2 Virtual Box Install Tutorial.mp4

Video
15:37
FREE

section1vid3 Kali Linux Install Tutorial.mp4

Video
13:57

section1vid4 Going Full Screen.mp4

Video
18:17

Basic commands

Basic Commands Part1.mp4

Video
9:41
FREE

Basic Commands Part 2.mp4

Video
21:6

Basic Commands Part 3.mp4

Video
12:48

Prepare your lab

Changing IP address and setting up Wireless Adapter.mp4

Video
4:53
FREE

Creating Bootable Kali USB .mp4

Video
5:00

Important Networking Terms.mp4

Video
10:18

Important Hacking Terms.mp4

Video
18:5

Few Things to Do After Installing Kali Linux.mp4

Video
8:32

Changing Our Mac Address Macchanger.mp4

Video
6:27

Footprinting!

Footprinting Google Hacking.mp4

Video
13:11
FREE

Footprinting Nikto Basics.mp4

Video
10:55

Footprinting Whois Tool.mp4

Video
6:40

Footprinting Email Harvesting.mp4

Video
6:8

Footprinting Shodan.mp4

Video
10:25

Footprinting Zone Transfer With Dig.mp4

Video
7:9

Scanning!

Scanning Installing Metasploitable

Video
7:00
FREE

Scanning Nmap Part 1.mp4

Video
15:34

Scanning Nmap Part 2.mp4

Video
11:43

Scanning Nmap Part 3.mp4

Video
12:25

Scanning Zenmap.mp4

Video
7:55

Scanning TCP scans.mp4

Video
15:52

Scanning Nmap Bypassing Defences.mp4

Video
17:24

Scanning Nmap Scripts 1.mp4

Video
9:30

Scanning Nmap Scripts 2.mp4

Video
14:00

Web penetration testing!

Webpentest Installing Owasp.mp4

Video
8:27
FREE

Webpentest HTTP request.mp4

Video
10:1

Webpentest HTTP Response.mp4

Video
10:30

Webpentest Burpsuite Configuration.mp4

Video
12:51

Webpentest Editing Packets in Burpsuite.mp4

Video
12:21

Whatweb Dirb.mp4

Video
10:12

Password Recovery Attack.mp4

Video
15:35

Burpsuite Login Bruteforce.mp4

Video
11:6

Hydra Login Bruteforce.mp4

Video
8:48

Session Fixation.mp4

Video
13:55

Injection Attacks.mp4

Video
5:35

Simple Command Injection.mp4

Video
11:10

Exploiting Command Injection Vulnerability.mp4

Video
7:44

Finding Blind Command Injection.mp4

Video
13:46

Basics Of SQL.mp4

Video
10:27

Manual SQL Injection Part 1.mp4

Video
13:17

Manual SQL Injection Part 2.mp4

Video
21:00

SQLmap basics.mp4

Video
16:37

XML Injection.mp4

Video
16:00

Installing XCAT and Preventing Injection Attacks.mp4

Video
5:53

Reflected XSS.mp4

Video
10:52

Stored XSS.mp4

Video
12:1

Changing HTML Code with XSS.mp4

Video
7:34

XSSer XSSsniper.mp4

Video
13:40

WPA2 cracking

Wireless Attacks Theory.mp4

Video
10:52
FREE

Putting Network Card in Monitor Mode.mp4

Video
4:41

Capturing Handshake With Airodump.mp4

Video
14:40

RockYoutxt.mp4

Video
14:00

Cracking with Aircrack.mp4

Video
15:35

Cracking with Hashcat.mp4

Video
15:00

Making Password Lists WIth Crunch.mp4

Video
18:22

Making Password Lists WIth Cupp.mp4

Video
7:12

Rainbowtables Part 1.mp4

Video
16:36

Rainbowtables Part 2.mp4

Video
5:40

Installing Fluxion.mp4

Video
6:20

Finding and Cracking Hidden Network.mp4

Video
8:22

Preventing Wireless Attacks.mp4

Video
8:00

Man in the middle

ARP Protocol Basics.mp4

Video
10:30

MITM Attack Theory.mp4

Video
7:22
FREE

Installing MITMf.mp4

Video
6:38

Manual Arpspoofing.mp4

Video
12:50

Problems While Installing MITMf.mp4

Video
6:21

HTTP Traffic Sniffing.mp4

Video
8:32

DNS Spoofing and HTTPS Password Sniffing.mp4

Video
24:20

Hooking Browsers With BEEF.mp4

Video
16:4

Screenshotting Targets Browser.mp4

Video
11:3

Cloning Any Webpage.mp4

Video
8:56

Ettercap Basics.mp4

Video
7:00

System hacking

MSFconsole Enviroment.mp4

Video
16:10
FREE

Metasploit Modules Explained.mp4

Video
12:14

Bruteforcing SSH with Metasploit.mp4

Video
15:20

Attacking Tomcat With Metasploit.mp4

Video
8:53

Getting Meterpreter With Command Injection.mp4

Video
25:8

PHP Code Injection.mp4

Video
5:46

Metasploitable Exploits.mp4

Video
7:00

Wine installation.mp4

Video
12:4

Crafting Windows Payloads With Msfvenom.mp4

Video
10:4

Encoders & Hexeditor.mp4

Video
18:45

Windows 10 Meterpreter Shell.mp4

Video
12:1

Meterpreter Enviroment.mp4

Video
11:30

Windows 10 Privilege Escalation.mp4

Video
11:30

Preventing Privilege Escalation.mp4

Video
6:23

Post Exploitation Modules.mp4

Video
14:13

Getting Meterpreter Over Internet With Port Forwarding.mp4

Video
10:43

Eternalblue Exploit.mp4

Video
20:20

Persistence Module.mp4

Video
13:19

Hacking Over Internet With Ngrok).mp4

Video
10:26

Android Device Attack With Venom.mp4

Video
9:55

Real Hacking Begins Now.mp4

Video
2:26

Python basics

Variables.mp4

Video
13:45
FREE

raw input.mp4

Video
10:49

IF ELSE statement.mp4

Video
10:20

FOR loop.mp4

Video
6:33

WHILE loop.mp4

Video
8:24

Python Lists.mp4

Video
8:7

Functions.mp4

Video
14:33

Classes.mp4

Video
10:25

Importing Libraries.mp4

Video
7:1

Files in Python.mp4

Video
11:44

Try and Except rule.mp4

Video
5:14

Coding advance backdoor

Theory Behind Reverse Shell.mp4

Video
6:50
FREE

Simple Server Code.mp4

Video
12:43

Connection With Reverse Shell.mp4

Video
7:10

Sending and Receiving Messages.mp4

Video
10:49

Sending Messages With While True Loop.mp4

Video
7:54

Executing Commands On Target System.mp4

Video
9:37

Fixing Backdoor Bugs & Adding Functions.mp4

Video
20:10

Installing Pyinstaller.mp4

Video
2:26

First Performance Test of Our Backdoor.mp4

Video
18:1

Trying to Connect Every 20 seconds.mp4

Video
12:26

Creating Persistence Part 1.mp4

Video
6:12

Creating Persistence Part 2.mp4

Video
16:50

Changing Directory.mp4

Video
11:55

Uploading and Downloading Files.mp4

Video
22:32

Downloading Files From Internet.mp4

Video
22:45

Starting Programs From Our Backdoor.mp4

Video
6:47

Capturing Screenshot On Target PC.mp4

Video
18:46

Embedding Backdoor In Image Part 1.mp4

Video
13:29

Embedding Backdoor In Image Part 2.mp4

Video
8:40

Checking For Administrator Privileges.mp4

Video
12:11

Adding Help Option.mp4

Video
8:52

Creating keylogger for backdoor

Importing Pynput.mp4

Video
10:24
FREE

Simple Keylogger.mp4

Video
10:00

Adding Report Function.mp4

Video
10:36

Writing Keystrokes To a File.mp4

Video
14:00

Adding Keylogger To Our Reverse Shell Part 1.mp4

Video
23:1

Adding Keylogger To Our Reverse Shell Part 2.mp4

Video
7:42

Final Project Test.mp4

Video
14:26

Basic authentication bruteforcer

Printing Banner.mp4

Video
11:21
FREE

Adding Available Options.mp4

Video
11:16

Starting Threads For Bruteforce.mp4

Video
8:26

Making Function To Run The Attack.mp4

Video
11:5

Bruteforcing Router Login.mp4

Video
9:40

Bypassing Antivirus With All Your Future Programs.mp4

Video
13:43

Sending Malware With Spoofed Email.mp4

Video
15:16

Whats Next .mp4

Video
4:15

Course Instructor

tutor image

MYB

67 Courses   •   95 Students