dots bg

Master Ethical Hacking

The Master Ethical Hacking course is designed to provide in-depth knowledge and practical skills necessary for identifying and addressing security vulnerabilities in systems, networks, and applications. The course covers topics such as penetration testing, network security, cryptography, web application security, and ethical hacking tools and techniques. Students will learn how to conduct security assessments, safeguard digital assets, and protect against cyber threats. By the end of the course, learners will be equipped to pursue roles like ethical hacker, penetration tester, security consultant, or network security administrator in a rapidly growing field.

Course Instructor MYB

₹1899.00

dots bg

Course Overview

Schedule of Classes

Course Curriculum

1 Subject

Master Ethical Hacking

144 Learning Materials

S01- Introduction and installation!

section1vid1 Before We Begin.mp4

Video
00:04:43

section1vid2 Virtual Box Install Tutorial.mp4

Video
00:15:37
FREE

section1vid3 Kali Linux Install Tutorial.mp4

Video
00:13:57

section1vid4 Going Full Screen.mp4

Video
00:18:17

Basic commands

Basic Commands Part1.mp4

Video
00:09:41
FREE

Basic Commands Part 2.mp4

Video
00:21:06

Basic Commands Part 3.mp4

Video
00:12:48

Prepare your lab

Changing IP address and setting up Wireless Adapter.mp4

Video
00:04:53
FREE

Creating Bootable Kali USB .mp4

Video
00:05:00

Important Networking Terms.mp4

Video
00:10:18

Important Hacking Terms.mp4

Video
00:18:05

Few Things to Do After Installing Kali Linux.mp4

Video
00:08:32

Changing Our Mac Address Macchanger.mp4

Video
00:06:27

Footprinting!

Footprinting Google Hacking.mp4

Video
00:13:11
FREE

Footprinting Nikto Basics.mp4

Video
00:10:55

Footprinting Whois Tool.mp4

Video
00:06:40

Footprinting Email Harvesting.mp4

Video
00:06:08

Footprinting Shodan.mp4

Video
00:10:25

Footprinting Zone Transfer With Dig.mp4

Video
00:07:09

Scanning!

Scanning Installing Metasploitable

Video
00:07:00
FREE

Scanning Nmap Part 1.mp4

Video
00:15:34

Scanning Nmap Part 2.mp4

Video
00:11:43

Scanning Nmap Part 3.mp4

Video
00:12:25

Scanning Zenmap.mp4

Video
00:07:55

Scanning TCP scans.mp4

Video
00:15:52

Scanning Nmap Bypassing Defences.mp4

Video
00:17:24

Scanning Nmap Scripts 1.mp4

Video
00:09:30

Scanning Nmap Scripts 2.mp4

Video
00:14:00

Web penetration testing!

Webpentest Installing Owasp.mp4

Video
00:08:27
FREE

Webpentest HTTP request.mp4

Video
00:10:01

Webpentest HTTP Response.mp4

Video
00:10:30

Webpentest Burpsuite Configuration.mp4

Video
00:12:51

Webpentest Editing Packets in Burpsuite.mp4

Video
00:12:21

Whatweb Dirb.mp4

Video
00:10:12

Password Recovery Attack.mp4

Video
00:15:35

Burpsuite Login Bruteforce.mp4

Video
00:11:06

Hydra Login Bruteforce.mp4

Video
00:08:48

Session Fixation.mp4

Video
00:13:55

Injection Attacks.mp4

Video
00:05:35

Simple Command Injection.mp4

Video
00:11:10

Exploiting Command Injection Vulnerability.mp4

Video
00:07:44

Finding Blind Command Injection.mp4

Video
00:13:46

Basics Of SQL.mp4

Video
00:10:27

Manual SQL Injection Part 1.mp4

Video
00:13:17

Manual SQL Injection Part 2.mp4

Video
00:21:00

SQLmap basics.mp4

Video
00:16:37

XML Injection.mp4

Video
00:16:00

Installing XCAT and Preventing Injection Attacks.mp4

Video
00:05:53

Reflected XSS.mp4

Video
00:10:52

Stored XSS.mp4

Video
00:12:01

Changing HTML Code with XSS.mp4

Video
00:07:34

XSSer XSSsniper.mp4

Video
00:13:40

WPA2 cracking

Wireless Attacks Theory.mp4

Video
00:10:52
FREE

Putting Network Card in Monitor Mode.mp4

Video
00:04:41

Capturing Handshake With Airodump.mp4

Video
00:14:40

RockYoutxt.mp4

Video
00:14:00

Cracking with Aircrack.mp4

Video
00:15:35

Cracking with Hashcat.mp4

Video
00:15:00

Making Password Lists WIth Crunch.mp4

Video
00:18:22

Making Password Lists WIth Cupp.mp4

Video
00:07:12

Rainbowtables Part 1.mp4

Video
00:16:36

Rainbowtables Part 2.mp4

Video
00:05:40

Installing Fluxion.mp4

Video
00:06:20

Finding and Cracking Hidden Network.mp4

Video
00:08:22

Preventing Wireless Attacks.mp4

Video
00:08:00

Man in the middle

ARP Protocol Basics.mp4

Video
00:10:30

MITM Attack Theory.mp4

Video
00:07:22
FREE

Installing MITMf.mp4

Video
00:06:38

Manual Arpspoofing.mp4

Video
00:12:50

Problems While Installing MITMf.mp4

Video
00:06:21

HTTP Traffic Sniffing.mp4

Video
00:08:32

DNS Spoofing and HTTPS Password Sniffing.mp4

Video
00:24:20

Hooking Browsers With BEEF.mp4

Video
00:16:04

Screenshotting Targets Browser.mp4

Video
00:11:03

Cloning Any Webpage.mp4

Video
00:08:56

Ettercap Basics.mp4

Video
00:07:00

System hacking

MSFconsole Enviroment.mp4

Video
00:16:10
FREE

Metasploit Modules Explained.mp4

Video
00:12:14

Bruteforcing SSH with Metasploit.mp4

Video
00:15:20

Attacking Tomcat With Metasploit.mp4

Video
00:08:53

Getting Meterpreter With Command Injection.mp4

Video
00:25:08

PHP Code Injection.mp4

Video
00:05:46

Metasploitable Exploits.mp4

Video
00:07:00

Wine installation.mp4

Video
00:12:04

Crafting Windows Payloads With Msfvenom.mp4

Video
00:10:04

Encoders & Hexeditor.mp4

Video
00:18:45

Windows 10 Meterpreter Shell.mp4

Video
00:12:01

Meterpreter Enviroment.mp4

Video
00:11:30

Windows 10 Privilege Escalation.mp4

Video
00:11:30

Preventing Privilege Escalation.mp4

Video
00:06:23

Post Exploitation Modules.mp4

Video
00:14:13

Getting Meterpreter Over Internet With Port Forwarding.mp4

Video
00:10:43

Eternalblue Exploit.mp4

Video
00:20:20

Persistence Module.mp4

Video
00:13:19

Hacking Over Internet With Ngrok).mp4

Video
00:10:26

Android Device Attack With Venom.mp4

Video
00:09:55

Real Hacking Begins Now.mp4

Video
00:02:26

Python basics

Variables.mp4

Video
00:13:45
FREE

raw input.mp4

Video
00:10:49

IF ELSE statement.mp4

Video
00:10:20

FOR loop.mp4

Video
00:06:33

WHILE loop.mp4

Video
00:08:24

Python Lists.mp4

Video
00:08:07

Functions.mp4

Video
00:14:33

Classes.mp4

Video
00:10:25

Importing Libraries.mp4

Video
00:07:01

Files in Python.mp4

Video
00:11:44

Try and Except rule.mp4

Video
00:05:14

Coding advance backdoor

Theory Behind Reverse Shell.mp4

Video
00:06:50
FREE

Simple Server Code.mp4

Video
00:12:43

Connection With Reverse Shell.mp4

Video
00:07:10

Sending and Receiving Messages.mp4

Video
00:10:49

Sending Messages With While True Loop.mp4

Video
00:07:54

Executing Commands On Target System.mp4

Video
00:09:37

Fixing Backdoor Bugs & Adding Functions.mp4

Video
00:20:10

Installing Pyinstaller.mp4

Video
00:02:26

First Performance Test of Our Backdoor.mp4

Video
00:18:01

Trying to Connect Every 20 seconds.mp4

Video
00:12:26

Creating Persistence Part 1.mp4

Video
00:06:12

Creating Persistence Part 2.mp4

Video
00:16:50

Changing Directory.mp4

Video
00:11:55

Uploading and Downloading Files.mp4

Video
00:22:32

Downloading Files From Internet.mp4

Video
00:22:45

Starting Programs From Our Backdoor.mp4

Video
00:06:47

Capturing Screenshot On Target PC.mp4

Video
00:18:46

Embedding Backdoor In Image Part 1.mp4

Video
00:13:29

Embedding Backdoor In Image Part 2.mp4

Video
00:08:40

Checking For Administrator Privileges.mp4

Video
00:12:11

Adding Help Option.mp4

Video
00:08:52

Creating keylogger for backdoor

Importing Pynput.mp4

Video
00:10:24
FREE

Simple Keylogger.mp4

Video
00:10:00

Adding Report Function.mp4

Video
00:10:36

Writing Keystrokes To a File.mp4

Video
00:14:00

Adding Keylogger To Our Reverse Shell Part 1.mp4

Video
00:23:01

Adding Keylogger To Our Reverse Shell Part 2.mp4

Video
00:07:42

Final Project Test.mp4

Video
00:14:26

Basic authentication bruteforcer

Printing Banner.mp4

Video
00:11:21
FREE

Adding Available Options.mp4

Video
00:11:16

Starting Threads For Bruteforce.mp4

Video
00:08:26

Making Function To Run The Attack.mp4

Video
00:11:05

Bruteforcing Router Login.mp4

Video
00:09:40

Bypassing Antivirus With All Your Future Programs.mp4

Video
00:13:43

Sending Malware With Spoofed Email.mp4

Video
00:15:16

Whats Next .mp4

Video
00:04:15

Course Instructor

tutor image

MYB

69 Courses   •   96 Students