Monday, January 25, 2021
Home Ethical Hacking The Complete Android Ethical Hacking Practical Course C|AEHP

The Complete Android Ethical Hacking Practical Course C|AEHP

The Complete Android Ethical Hacking Practical Course C|AEHP, 100% Hands-On Real World Practical Approach on Android Ethical Hacking. Learn to Prevent FACEBOOK, INSTAGRAM hacking!

New Announcement: Course Update for September Month

Hello Everyone!

Welcome to the CAEHP i.e. the Complete Android Ethical Hacking Practical Course.

My name is DEBAYAN DEY and I will be your Instructor for the CAEHP Course.

CAEHP is one of the Most Comprehensive Real World  100%  Hands-On Practical Approach to Android Ethical Hacking…!!!

Now, this course is designed for anyone interested in learning how an attacker attack and get the information from the victim.

CAEHP is designed by keeping in mind that most of us are not having laptops or computer machines to work for most of the time.  That’s why in this course curriculum, you need not require any laptop or computer system.

Only you need an android device and this entire course is 100% practical based!

isn’t this amazing ???

Yes, plus the most important thing, you need not root your Android device.

waaoo !!! so all in one,  you just require an android phone and turn it into a powerful ethical hacking machine.

Lil brief about my name, I am Certified Secure Computer User (CSCU) v2 , and Certified Ethical Hacker (CEH V10) from EC COUNCIL

also, I am certified Google IT support from Google, and currently doing micromaster in the Field of Cyber Security from Rochester institute of technology (RIT) New York in edx.

here are a few of my other accomplishments in the field of cybersecurity,

  • Introduction to Cyber Attacks, New York University
  • introduction to Cybersecurity for business, University of Colorado System
  • Palo Alto Networks academy cybersecurity foundation, Palo alto networks
  • International cyber conflicts, The State University of New York
  • Cyber Attacks Countermeasures, New York University
  • Networking and Security Architecture with Vmware NSX
  • Enterprise System Management and security, University of Colorado System

Rest we’ll have a meet and greet section to know other Learners …!!!

so what’s there in this CAEHP COURSE?

First of all, I would love to tell you, that this course is not limited to time.

You may see 6 or 7 sections today, once you land in this course after a few weeks, you’ll see more sections and videos are added up.  so this is the advantage of taking this course that you’ll get regular updates about the new features and attacks and how you, as an individual can prevent yourself from such an attack.

so currently in the CAEHP course, we have 6 Section + 1 Optional Section and 1 Bonus Section


  • Meet and Greet
  • Introduction of the Section
  • What is Termux?
  • What is Shell?
  • Why Termux?
  • Installation
  • What is F-Droid?
  • Package Management
  • Q/A Session with the instructor  and  various Social Media availability

So, we’ll turn our Android device into a complete ethical hacking powerful device by installing termux.


  • Next, we’ll cover, termux basics by learning various CLI commands.
  • Installing TERMUX from Google Play Store
  • Storage Setup, Update and Upgrade
  • Learn why we use apt
  • hidden files, versions
  • Various Text Editor
  • Learn how to check IP
  • Various other Network Related Commands
  • Learn why we change various modes
  • Learn how to use GIT Repository
  • and much more cool stuff…!!!!


  • Thereafter we’ll cover one of the most powerful tools in penetration testing and ethical hacking, i.e. Metasploit Framework.
  • We’ll see  how an attacker create payloads
  • perform LAN   and WAN i.e local area  network and wide area network attacks
  • using port forwarding
  • and how the attacker creates persistent Payload
  • Learn BASH Scripting
  • and how attackers takes the control of the victim’s mobile device and get all the data.
  • and much more cool stuff…!!!


  • next, we’ll learn what is Encryption
  • what is Decryption
  • how we can encrypt our files
  • how we can Decrypt our files
  • Learn how we can protect our files and folders with passwords
  • so in this section, we’ll cover the installation of 3 very important tools used for Encryption and Decryption in Linux
  • What is SALT in Cyprography?
  • Further, we’ll learn how we can perform Encryption and Decryption
  • and much more cool stuff…!!!


  • most exciting Section
  • Introduction
  • What is Phishing Attack?
  • We gonna learn how an attacker do phishing attacks.
  • here we’ll mirror any website
  •   We’ll also learn how we can clone Facebook, Instagram, Twitter, or any social media
  • installation of PHP
  • starting of PHP server 
  • Run the Cloned Website in your LocalHost
  • Then uploading  the files online
  • Run the Cloned Website Online
  • Learn Social Engineering
  • Share the link to the Victim and get the Username and the Password once the Victim tries to log in
  • and then creating an app for the cloned website
  • Share the Android App with the victim
  • Again learn how to do Social Engineering so that the Victim downloads the App
  • Get the Username and the Password once the Victim tries to Login from the APP
  • So in this section, we’ll see how an attacker sends a link or an app to the victim and once the victim tries to login with login credentials, bang, the victim’s password is with the attacker.
  • and much more cool stuff…!!!!


  • The next section is pretty much interesting
  • we’ll see how we can do port forwarding
  • generate an HTTP or HTTPS  URL Link
  • how by simply sending a link  an attacker gets complete camera access
  • and receives the photographs after every few intervals of time of the victim.
  • Next, we’ll see how to Uninstall such Dangerous Package
  • We will learn how to stay safe
  • Prevent from getting Hacked
  • Learn how to Aware of your Family Members and known person by teaching them how to stay protected
  • and much more cool stuff…!!!!


  • this section is named as optional section, we gonna cover various tools that can be very handy for the rooted android device.
  • Ok, so those who are having rooted android devices can go through this section.
  • Learn to work of  Wifi Network
  • Learn what is AIRCRACK-NG
  • Installation of the package
  • Learn how to use AIRMON-NG
  • and much more cool stuff to be added up…!!!!


  • and last but not least we have a bonus section.
  • We’ll see how we’ll  run Kali Linux on our Android device
  • No need to Root your Android Device
  • Apps to install
  • Installation of Kali Linux
  • Learn using SSH Client
  • Turn your Android Device into a Penetration Testing and Ethical Hacking Device
  • and much more cool stuff to be added up…!!!!

So all the sections will cover Quizzes, Assignments, and Reading Materials.

Also, all the sections will be updated regularly and new sections will also be added up, so once you are enrolled in the course, you’ll surely gonna learn various techniques on how attackers attack and how we can save ourselves from getting attacked.

  • Most importantly, this course is completely for educational purpose
  • all the attacks which an attacker performs are demonstrated to you so that you understand the technology and the art behind it and you’re not fooled by any kind of social engineering.
  • This course is for educational and awareness purposes, to make everyone aware and be safe and to protect your data.
  • Its a request, please do not perform any illegal activities, Udemy and me ( Debayan Dey ) are not responsible for the illegal activities you perform.

so, Welcome to the world of complete android Ethical hacking practical course.

Feel Free to Reach out at any point in time, I will be happy to help you, and if you face any PROBLEM, just post your DOUBTS, you will be Answered within 24hrs to 48hrs of time ..!!!!!

ARE YOU EXCITED to learn a 100% complete practical course and help your family stay secured and safe from data theft and hackers?

Wish you all the best…!!!!

See you on the course landing page ….!!!!

Enroll Now


Please enter your comment!
Please enter your name here

Most Popular

How I Sell Books On Amazon

SQL for Data Analysis and Data Science in 2021