Your Cart
Loading

ETHICAL HACKING COURSE A-Z BY MR_KALI_HACKER

On Sale
$15.00
$15.00
Added to cart

Welcome to Cybersec Academy Telugu!


Are you ready to embark on a journey into the world of cybersecurity?


Explore our online shop, get in touch with us, or log in to access exclusive content.


Ethical Hacking Course A-Z by Mr_Kali_Hacker


Language: Telugu


Created by: Mr_Kali_Hacker


Duration: 18+ hours


Course Size: 1.7 GB (includes resources)


Videos: 26


Video Screen Resolution: Full HD 1920×1080


In this course, we provide you with all the tools, software, and videos you need to learn hacking. And the best part? You can learn hacking in your mother tongue!


What you will learn:


1. Introduction: Why and how hacking is important

- Is programming language required? What and why?


2. Labs used and their importance

- Installing and explaining labs to make you comfortable with them

- Understanding Windows, Linux, OS, and applications

- Terminal and GUI concepts

- What is ping?


3. Linux basics and Windows basics

- Command line usage cheat sheets

- Linux and Windows file systems


4. OSI model, TCP/IP model, protocols, and ports

- Creating and overviewing labs


5. Network hacking

- Theory and practical applications

- Understanding HTTP, HTTPS, HSTS

- Client-server architecture

- Network penetration testing

- Basic network concepts

- Tools used


6. Client-side attacks

- Tools used

- Hacking Android, Windows, Linux

- Viruses, worms, Trojans

- Hacking tools and techniques

- Remote exploits

- Persistence

- Spyware

- Keyloggers

- Port forwarding

- Binding

- Delivering and much more


7. Website hacking

- Theory of client and server

- HTTPS, HSTS, protocols, and requests

- Setting up a local web server and database

- SQL language basics coverage

- Tools used

- Burp Suite usage

- Scanners

- Basics of web languages (HTML, JavaScript)

- Labs setup

- Information gathering

- OWASP Top 10 vulnerabilities

- Main focus on SQL injection, XSS, CSRF, LFI, XML external entity, RFI, parameter tampering

- Many more tools, methods, and concepts


7.1 Web server hacking

- Steps of hacking

- Step-by-step theory and demonstration

- Using Metasploitable2 and real-world machines


8. Cryptography


9. DoS and DDoS attacks


10. Malware analysis and reverse engineering


11. Solving CTFS in Hack The Box


12. Social media hacking and cracking: theory and practicals

- Phishing

- Brute force

- Android PIN brute force (our tool)


Disclaimer: The content provided is for informational and educational purposes only. All practice demos are performed on our own devices or networks. We are not responsible for any actions taken.


Labs, Devices, and Software we use:

Web Goat, DVWA, Mutilladae, Metasploitable2, Juice Shop, various CTFS, Windows 10/8.1/7/11, SQLi Labs, Android 5/11, LFI/RFI labs, Kali and GitHub tools, Kali Linux, Ubuntu, LinuxLite, and many more.


Requirements: Basic knowledge of computers


Share the knowledge and empower yourself in the world of cybersecurity!

You will get a PDF (63KB) file