4.80
(40 Ratings)
Complete Advanced Cyber Security Training
Categories: Cyber Security
About Course
π₯ 6 Months of Power-Packed Live Classes (with Lifetime Recordings)
π Globally Recognized ISO-Certified Hard Copy Certificate
π οΈ 180+ Premium Hacking Tools & Paid Software β FREE Access
π€ 24Γ7 AI + Expert Chat/Call Support (Never Get Stuck Again)
π Exclusive VIP Community of Hackers & Cyber Experts
π Complete Study Kit: Books, Notes & Digital Resources
π― Weekend Live Practice Tests to Sharpen Skills
π» Mini Projects to Build Real-World Hacking Experience
π 100% Practical Training β Zero Boring Theory
π Internship Opportunities with Real Case Studies
π 1:1 Career Mentorship by Top Industry Experts
πΌ Professional Resume & LinkedIn Profile Boost for Jobs
βΎοΈ Lifetime Access to Course, Tools & Dedicated Support
π Free Lifetime Updates β New Tools, Videos & Modules Added Regularly
What Will You Learn?
- Understand A Hackers Mindset. ...
- Know Hidden Techniques and Explore Better Ways. ...
- Helps with Development and Quality Assurance. ...
- Good salary package. ...
- The world is your Oyster.
Course Content
Download Tools
-
Tools
00:00
TCSP Rohit sir 2023
-
1. Introduction
01:08:06 -
2. Lab setup kali Linux installation VMware
01:50:12 -
3. Linux or basic kali Linux command
01:30:09 -
4. Anonymity Theory class
01:48:45 -
5. Anonymity practical
01:58:42 -
6. Anonymity practical
01:37:00 -
7. Internet Fundamental
01:42:29 -
8. Foot Printing Theory & Practical Both.
01:41:44 -
9. Foot Printing Theory &Β PracticalΒ Both
01:51:08 -
12. Scanning
01:18:49 -
10. DNS Details
01:54:50 -
11. Class
01:37:41 -
13. Class
01:18:49 -
14. Firewall Bypass
01:58:02 -
15: Sniffing Theory
01:36:45 -
16. Sniffing Practical
01:18:49 -
17. MITM
01:47:02 -
18. MITM
01:55:08 -
19. WireShark
02:01:21 -
20. Arp Poisining, Ettercat
01:16:11 -
21. Arp Poisining Detection, Mac Flooding
01:45:27 -
22. Downgrade HTTPS to HTTP packet
01:57:42 -
23. Malware detection via Traffic Monitoring
01:40:50 -
24. DNS Spoofing
01:40:37 -
25. HoneyPot
01:31:44 -
26. PentBox (Honey Pot)
01:08:45 -
27. OpenCanary
01:07:34 -
28. Firewall Detection, DOS Attack
01:08:35 -
29. Remaining anonymizing section
26:45 -
30. Session Hijacking
01:44:26 -
31. Session Hijacking Practical, XSS
03:00:59 -
32. Mac Spoofing
01:11:33 -
33. Logout url
28:05 -
34. Open URL Redirection
10:00 -
35. Enumeration Part 1
01:43:43 -
36. Enumeration Part 2
02:27:09 -
37. Exploiting Metasploitable 2
01:27:00 -
38. Wifi Pentesting
01:12:03 -
39. Wifi Jamming, Handshake Capturing
01:23:40 -
40. Wifiphisher, Evil Twin attack, Wifite
02:03:30 -
41. Wifi Sparrow Usage
01:12:36 -
42. Wordlist Creation
01:07:55 -
43. Sniffing via fake Ap
48:41 -
44. Kismet Wifi Tool
01:13:24 -
45. Routersploit and wifiphisher
01:30:01 -
46. Wifipumpkin and wifiphisher revision
01:41:43 -
47. Wifipumpkin custom template setup
31:28 -
48. Evil Trust
01:05:08 -
49. Esp8266 usage
01:03:39 -
50. Evil twin attack using esp8266
41:27 -
51. Vulnerability Assessment Theory
56:33 -
52. Routersploit Usage
01:13:58 -
53. OpenVas GVM Setup
53:16 -
54. Scanning using openvas
01:25:14 -
55. Scanning using the sparta tool
01:03:21 -
56. Creating sock puppet account
01:32:55 -
57. Nessus Usage
32:10 -
58. Report reading created by Nessus
53:17 -
59. Directory enumeration
01:07:36 -
60. Skipfish and Nessus external VAPT
46:09 -
61. Acunetix Vulnerability Scanner
01:13:02 -
62. FTP Anonymous login
42:22 -
63. Ssh, Telnet, Rlogin, Smb, VNC Exploits
01:28:26 -
64. Php exploit
22:08 -
65. Metasploit theory
46:32 -
66. Windows 7 basic Exploitation using Metasploit
52:06 -
67. Exploiting eternalblue vuln in win7
37:08 -
68. Privilege escalation and Session Persistence
01:00:45 -
69. Event logs clearing, new user adding in windows
22:57 -
70. Malware Analysis Theory
47:46 -
71. Async Rat practical
50:12 -
72. Builders Usage
01:13:23 -
73. Android exploitation
59:48 -
74. Android Craxsrat exploitation
01:07:19 -
75. Apk build and sign and bypass play protect
01:34:42 -
76. Port Forwarding
01:28:59 -
77. Steganography
01:08:52
TCSP Rohit Sir 2024
-
02:30:04
-
02:03:03
-
02:27:41
-
02:21:00
-
02:27:00
-
6. Anonymity practical 2
01:37:15 -
7. Anonymity practical 3
01:40:12 -
8. Internet fundamental
01:18:00 -
9. Information gathering part 1
01:50:48 -
10. Information gather practical 2
01:30:13 -
11. Network scanning theory
01:29:31 -
12. Nmap practical
01:36:11 -
13. Nmap firewall bypassing
02:09:15 -
14. Sniffing theory
01:11:00 -
15. Wireshark practical 1
01:33:00 -
16. Wireshark practical 2
01:19:00 -
17. Mitm attack
01:22:00 -
18. Decrypt tls https packet in analyze in plain text
01:31:30 -
19. Https tls decrypt mitm attack
01:32:00 -
22. Dns spoofing attack
01:24:00 -
23. Arp spoofing and mac flooding attack
01:22:00 -
24.How to detect sniffing mitm and arp spoofing attack
01:07:36 -
25. Ids and honeypot setup for security or track scammer hackers
01:18:53 -
26. Service based ids honeypot setup pentbox
52:33 -
27. Opencanary create and setup your own SMTP based email sending honeypot free method.
01:28:00 -
28. Mac spoofing practical or theory
01:42:00 -
29. Dos or DD0Sattack attack practical
01:10:20 -
30. Waf web application firewall detection
-
31. Web application firewall (waf) bypass cloudflare
01:06:00 -
32. Session hijacking theory
01:15:00 -
33. Active Session hijacking practical
55:00 -
34. Passive session hijacking practical
01:06:00 -
35. Session hijacking ( Side jacking practical + Xss attack practical)
58:00 -
36. Enumeration Theory
01:00:00 -
37. Enumeration practical 1
01:30:00 -
38. Enumeration Practical Part 2
01:14:00 -
39. Wifi Hacking Theory
59:00 -
40. Topic – wifi adaptor driver installation and check monitor mode, packet injection, Fake ap (Practical)
01:12:00 -
41. Topic – WIFI Hacking Using Wordlist or Bruteforce Attack
01:02:00 -
42. Evil twin fake ap wifi hacking airgeddon
01:09:00 -
43. Wifiphisher evil twin fake AP attack without handshake
57:00 -
44. Wifipumpkin Set-Up & A Tool For Creating Fake Ap Captive Portals For Sniffing, Phishing
-
45. Anonymity New Class
01:43:00 -
46. Evil Trust Evil Twin Attack Attack Grab Your Social Media And Account Password Using Fake Access Point Wifi Penetesting.
01:04:00 -
47. Automating Wifi Security Penetration Testing With Wifi Sparrow & Wps Pin Attack
54:00 -
48. Reveal Wifi Hidden Ssid
01:15:00 -
49. Create Target Based Wordlist For Password Cracking
01:00:05 -
50. Additional Topic – Bluetooth Device Microphone And Speaker Pentesting (Trim)
45:00 -
51. Making Wifi Jammer Deauther, Using Nodemcu Esp8266
45:00 -
52. Evilportal Attack Using Nodemcu Esp8266
30:20 -
53. Vulnerability Assessment Theory
01:01:00 -
54. Installation And Setup Of Nessus
01:15:00 -
55. Internal Vulnerability Assessment Using Nessus Scan System Network Server To Find Vulnerability
53:00 -
56. Part 1 Sniffing Theory And Idle Zombie Scan For Bypassing Firewall.
33:00 -
57. Part 2 Sniffing Theory And Idle Zombie Scan For Bypassing Firewall.
14:00 -
58. Part 3 Sniffing Theory And Idle Zombie Scan For Bypassing Firewall.
24:00 -
59. Web Directory Bruteforcing Uncovering Hidden Directories And Sensitive Data Eg Tools Dirbuster, Gobuster
01:30:00 -
60. Web Vulnerability Scanning Identifying Security Risks With Automated Tools Eg Nikto, Uniscan, Skipfish
01:03:00 -
61. Topic – Web Vulnerability Scanner Accunetix Or How To Set-Up
01:12:00 -
62. Metasploit Framework Module Explanation Practical
48:00 -
63. Ftp Service Vulnerability Gaining Server Access Through Command Injection
01:05:00 -
64. Server Hacking Pentesting (Os-Command Injection)- Exploiting Vnc And Rpcbind (Root Login)
44:50 -
65. Server Hacking Pentesting (Os-Command Injection) Exploiting Apache, Tomcat, Php, Samba & Sql For Command Injection
01:22:00 -
66. Topic – Penetration Testing With Metasploit Generating Windows Payloads For Remote Access
01:24:00 -
67. Topic – Exploiting Ms17-010 Vulnerability Gaining Unauthorized Access To Windows Computers Without Payload Execution
40:00 -
68. Topic – Post-Exploitation Attack Vectors Escalating Privileges, Migrating Processes, And Covering Tracks
01:18:00 -
69. How To Operate Rat (Remote Access Tool). How To Build Payload.
01:18:00 -
70. Topic – Android Pentesting Using Cypher Rat
01:12:00 -
71. Topic – Binding Or Injection Method In Android App Using Cypher Rat
01:24:00 -
72. Topic – Port Forwarding Method Access Any Device Remotely Overwan
01:50:00
TCSP Satyam Sir 2025
-
1. Intro Class
02:02:00 -
01:16:00
-
52:00
-
5. Anonymity Practical 2
01:40:00 -
6. Basic Hacking Technic Practical
47:45 -
7. Ip Bouncing Jamping
01:02:00 -
8. Anonymity Class 3
01:13:00 -
9. Anonymity Class 4
01:24:00 -
10. Pypschier
01:19:00 -
11. Footprinting
01:26:00 -
12. Wayback Machine
40:00 -
13. Footprinting 2
01:22:00 -
14. Internet Of Fundamental
35:20 -
15. How To Download Any Website
37:00 -
16 .Module 1 Test Analysis
40:00 -
17. Assignment Of Footprinting
18:00 -
18. Scanning Class 1
01:24:00 -
19. Scanning Class 2
01:18:00 -
20. Namp Basic Commands
01:02:00 -
21. Nmap Practical
52:00 -
22. Mac Address Change
01:20:00 -
23. Lab Solution
01:12:00 -
24. Metasploitable Machine Scan
01:05:00 -
25. Wifi Hacking Theory
01:14:00 -
26. Wifi Hacking
01:40:00 -
27. Sniffing Theory
01:10:00 -
28. Live Router Working And Security
01:12:00 -
29. Wireshark 1
01:12:00 -
30. Wireshark 2
01:53:00 -
31. Mitm Attack
01:09:00 -
32. Decrypt Tls Https Packet-& Analyse In Plain Text
01:14:00 -
33. Dns Arp Spoofing Attack Theory & Practical Class
01:08:00 -
34. Netcut Spoofing Attack
01:14:00 -
35. Ettercap Dns Spoofing
53:00 -
36. Dnsarp Spoofing Attack Class 1
01:19:00 -
37. Dnsarp Spoofing Attack Class 2
01:12:00 -
38. Honeypot Idsips Theory & Set-Up Class 1
01:10:00 -
39. Honeypot Idsips Set-Up Class2
01:20:00 -
40. Open Canary Smtp Idsips
01:14:00 -
41. Mac Spoofing flooding And Dos Attack Theory And Practical
01:31:00
TCSP Anand sir 2025
-
01:08:00
-
01:18:00
-
01:42:00
-
01:35:00
-
01:05:00
-
6. Linux Basics Commands
01:17:00 -
7. Linux File Permissions
01:04:00 -
8. Module 3 Recon
01:22:00 -
9. Recon Part 2
01:16:00 -
10. Mannual Recon
01:08:00 -
11. Mannual Recon Part 2
50:00 -
12. Recon Automation Part 1
01:05:00 -
13. Recon Automation Part 2
01:02:00 -
14. Recon-ng toll set up
-
15. Scanning
01:10:00 -
16. Port exploitation
01:00:00 -
17. Nmap in detail
01:15:00 -
18. Windows security elements
01:00:00 -
19. Windows security elements and enumeration
40:00 -
20. Snmp Enumeration
01:02:00
TCSP 4.26 (Yuvraj sir) 2026
-
01:57:00
TCSP 4.25 2026
-
02:02:00
-
01:50:00
-
01:40:00
-
01:13:00
-
6. Anonymity Practical 2
01:18:00 -
7. Anonymity practical 3
01:40:00 -
8. Anonymity practical 4
59:00
TCSP 4.22
-
14. Automation And Recon-Ng
01:45:00 -
15. Subdomain Bruteforcing & Directory Bruteforcing (1)
01:50:00 -
16. Recon Final
60:00 -
17. scanning
56:00 -
18. Ports exploitation
01:06:02 -
19. Port scanning
01:15:00 -
20. Windows security elements
01:35:00 -
21. ENUMERATION part 1
01:30:00 -
22. ENUMERATION part 2
01:06:00 -
23. ENUMERATION part 3
01:13:00 -
26. system hacking
42:00 -
27. System hacking Part 2
01:05:00 -
28. Malware threats
01:02:00 -
29. Malware threats 2
58:00 -
30. password cracking
53:00
TCSP 4.24
-
01:15:00
-
01:02:00
-
01:02:00
-
01:42:00
-
01:36:00
-
6. Lab Setup
01:19:00 -
7. Linux File System
01:30:00 -
8. Linux Commands
50:00 -
9. Linux File Permissions
01:06:00 -
10. Recon Part 1
01:10:24 -
11. Recon Part-2
54:00 -
12. Recon 3
01:22:00 -
13. Subdomain Enum 1
58:00 -
14. Automation
01:20:00 -
15. Wayback
54:00 -
16. Fuzzing
01:06:00 -
17. Google Dorking
59:00 -
18. Enumeration Part 1
02:04:00 -
19. Enumeration Part 2
03:02:00 -
20. Network scaning
02:10:00 -
21. Network scanning Part 2
01:57:00 -
22. Vulnerability Assessment Part 1
02:01:00 -
23. Vulnerability analises Part 2
01:55:00
Fundamentals of Ethical Hacking
-
Introduction to Ethical Hacking
08:00 -
Types of Hacker
04:00 -
Terms used in Ethical Hacking
06:00 -
More Terms On Instagram
04:00 -
Introduction To Ip Address
07:00 -
Public or Private IP Address
02:08 -
Create Local Host 127.0.0.1
07:00 -
Create Your Own Hacking Lab
04:00 -
Install Kali Linux On Virtual Box
07:20 -
Virualization On
03:20 -
Install live Kali Linux On Virtual Box
07:20 -
Install Windows 7 On Virtual Box
11:14 -
How to Become Ethical Hacker Part 1
46:20 -
How to Become Ethical Hacker Part 2
59:05 -
Introduction How to open MS DOS
04:09 -
DISPLAY RELATED COMMAND
02:45 -
FILE RELATED COMMAND
03:08 -
How to change colour or fonts
01:28 -
How to Make a directory
06:00 -
Important commands
03:54 -
Professional Command Prompt
02:47 -
Logoff, Shutdown, Restart and Lock Computer Windows
02:10 -
Kali linux Overview all tools
07:16 -
Make Phishing Page in Kali linux
07:10 -
Basic Command Of Kali Linux 1
10:00 -
Basics Commands of Kali Linux 2
12:14 -
Basics Kali Linux Commands 3
10:54 -
How to change mod or chmod command
07:49 -
Basic Command Of Kali Linux 5
03:53 -
How_to_become_a_Hacker___For_beginners_full_details_in_hindi
05:20 -
How to Download Tools
02:44 -
How_to_Hack_Facebook_using_phishing_method_fake_Facebook_website_practical(1080p)
05:34 -
How_To_Create_Any_Type_Of_Phishing_Page_On_Andriod_With_Practical(720p)
09:37 -
How_to_Create_a_Local_Host_In_Windows_with_practical(1080p)
04:34 -
How Create a Local Host in Android
04:40 -
How_To_Make_Phishing_Page_for_Any_website_On_Windows_With_Practical(1080p)
05:46 -
How_To_Make_Fake_Phishing_Page_With_Original_Address_bar(1080p)
06:08 -
Homograph attack practical
02:16 -
How_to_port_Forwarding_in_windows_with_Practical(1080p)
05:00 -
How_to_port_Forwarding_in_Andriod_with_Practical(720p)
06:44 -
Hack_Instagram_With_Phishing_Latest_Methods_with_Practical(1080p)
02:52 -
How_To_Host_Phishing_page_with_ngrok_on_Android(720p)
04:46 -
All_types_of_phishing_page_provided
03:11 -
What_is_Tab_napping_in_phishing_how_to_perform_practical_in_hindi(1080p)
04:10 -
Modlishka_Advance_Phishing_Attack_Next_level_Hacking(1080p)
03:24 -
How_to_Create_tabnapping_page_in_Phishing_practical_in_hindi_part-2(1080p)(1)
06:16 -
How to Hacker Hack bank account using Phishing How to Secure
05:33 -
How to Hack instagram using phishing method
08:49 -
How To Detect And Prevent Phishing and use socail engineering
06:57 -
01:16:29
-
24:14
-
Assignments
-
Take Ethical Hacking Quiz to Test Your Knowledge
Information Gathering / Reconnaissance
-
How to Hack any account using Foot printing Demo
08:12 -
some Technic explain
05:31 -
Footprinting with website practical
09:40 -
How to Download any website
09:43 -
How to collect Information From Email
04:45 -
How to collect Information From Network
07:37 -
Collect Information form bike car hindi
03:24 -
How to know victim IP Address or track location
06:18 -
How to find people From Gather Information
07:14 -
Open Source Intelligence Information Gathering
05:43 -
OSINT Tools Part 2
02:38 -
How see Any Data base Like Police
03:15 -
How to Download or configure maltego Tools
07:00 -
What Learn in Footprinting
06:58 -
Collect Information From Picture
06:00 -
Collect Information Through spokeo
03:32 -
Google Dorks part2
05:26 -
How to Use Google Dorks
03:10 -
How to use Maltego tools for information Gathering
12:45 -
How to collect Information form mobile number using Eyecon
04:02 -
Internet service provider Data base like Airtel , jio ,idea etc
04:28 -
How to disable Windows defender
00:47 -
See Site Map any website
03:34 -
Completely Hide Your Personl Details From Internet
02:55 -
Competitive intelligence
08:00 -
Brute force attack explain or How to generate Wordlist
06:13 -
Brute force attack explain or How to generate Wordlist
06:13 -
Cracking Password with Brute Force Attack
09:26 -
Live Hack Instagram Account
05:31 -
How to install all requests
02:52 -
Dictionary Attack generate dictionary words
05:04 -
How use any wordlist
07:49 -
01:06:13
-
47:35
-
23:28
-
Assignments
Scanning Techniques
-
Scanning Network
19:26 -
Live Network Port And Ip Scanning
19:00 -
Osi Model , udp or tcp explain
13:00 -
Live IP scanning
15:32 -
Installing Nmap on Android
11:48 -
Android Phone Live Network Port And Ip Scanning
10:52 -
OS Fingerprinting and Banner Grabbing
18:48 -
How to use Nmap in kalilinux
13:34 -
Check Target Basic Details
12:44 -
Vulnerability scanning
10:11 -
Vulnerability scanning through RED HAWK
24:53 -
Close Open Ports And Secure Your Data
09:49 -
Introduction To Proxy-1
06:57 -
How To Use Free Proxy Server
07:44 -
Set Proxy in Your Browser
09:13 -
Proxy chaining
09:56 -
Proxy chaining manual
09:57 -
Aggressive Scan
55:34 -
01:00:24
-
Assignments
Enumeration or Gaining Access
-
Enumeration Explained
14:23 -
Enumerations depend on the services
10:53 -
Enumeration Practical Gaining access using Netbios
19:02 -
What is SSL and DHCP Protocols
09:27 -
Web Enumeration Practical
11:18 -
Smtp Enumeration practical
17:26 -
Dns Zone Transfer Practical
18:09 -
Countermeasure of Enumeration
10:20 -
01:11:22
-
Module 4 Assignments
Vulnerability Analysis
-
Vulnerability Analysis
14:21 -
Vulnerability Scoring Systems
17:53 -
vulnerability scanning tools
07:24 -
Installing NESSUS on Windows
16:05 -
Scanning for Vulnerabilities Using Nessus
08:38 -
Installing NESSUS on Kalilinux
05:27
System Hacking & Password Cracking
-
System Hacking
11:57 -
Non-Electronic Attacks
14:34 -
Active Online Attacks
08:36 -
Crack Windows Password Using Sam File
15:13 -
Hack system using rat
17:26 -
How to Hack Android Phone Using Virus
08:33 -
How to make undetectable Keylogger
10:49 -
usb hacking
14:49 -
How to make Usb Keylogger
06:23 -
Hack system using worm
20:04 -
How to make Fud Worm
17:02 -
How to Bind any virus In Any Software
06:28 -
Many types of virus
03:11 -
Goals of System Hacking
06:03 -
How to Crack Wiindows Password
15:32 -
How to Hack Windows Password
14:48 -
How to use Computer Without login
11:29 -
Offline Attacks
10:18 -
How to Defend against Password Cracking
10:00 -
privilege escalation
12:25 -
Types of Privilege Escalation
10:09 -
How to Defend Against Privilege Escalation
04:36 -
Executing Applications
16:19 -
Spyware
16:08 -
Hiding Files
18:49 -
Detecting and Defending Rootkits
15:47 -
NTFS Stream
13:35 -
Make Own Keylogger
57:58 -
How Attacker Remotely can Access Your Computer using Image,Videos,Mp3,pdf
01:03:10 -
Metasploit Introduction
15:04 -
Install Metasploit in Termux
03:30 -
Metasploit lesson 2
14:23 -
How to use exploit
14:27 -
Metasploit Important command
11:48 -
Metasploit framework Module
15:49 -
Metasploit File system
14:56 -
Metasploit Ruby shell
09:40 -
Types of Payload
14:10 -
How to use Auxiliary in Metasploit
10:41 -
Hack windows 7 using metasploit payload
30:57 -
Hack Windows 10 using Payload
16:51 -
Hack Android phone using metasploit payload
13:11
Malware and its types
-
Introduction to Malware
18:30 -
Create a Ransomware virus
17:34 -
Evading Anti-Virus Techniques
09:48 -
How to make Undetectable virus
01:05:32 -
How to make Undetectable virus part 2
01:02:04 -
Stages of Virus Life
12:13 -
What is Sheep Dip Computer
05:09 -
Malware Analysis Procedure
10:40 -
Scanning for Suspicious Processes
10:00 -
Scanning for Suspicious Ports
10:45 -
Scanning for Suspicious Startup Programs
06:27 -
Penetration Testing for Virus
12:06
Sniffing and Spoofing
-
Network Sniffing and Threats
01:02:29 -
Passive Sniffing Sniff User name or Password
01:04:18 -
Smart Phone Traffic Capture
36:38 -
Active Sniffing mitm attack
55:13 -
Sniffing in linux
05:02 -
How to detect sniffing
43:02 -
MAC Address
08:26 -
Mac Spoofing in linux
12:07 -
Mac spoffing in windows
05:56 -
MAC Flooding attack
03:23 -
Dns Spoofing
52:36 -
Calling Trick With Any Fake number
03:34 -
How to call any one using fake indian number
02:22 -
How to Hacker Call With Your Number Sim cloning
07:59 -
Live Spoof Call with any number
10:04
SOCIAL ENGINEERING – HUMAN MIND HACKING
-
What is a Social Engineering or Phases of Social Engineering
07:41 -
Social Engineering is so effective
04:42 -
Hack with Phishing using Social engineering technic
06:13 -
More social engineering Technics
06:42 -
Clickbait explained
01:35 -
Social Engineerning through fake app
08:00 -
Hack Youtube Channel Through Promotional mail
04:17 -
Share and Earn Money
04:30 -
Real life social Engineering
01:46 -
USE TRENDS
05:38 -
How To Detect And Prevent Phishing and use Social engineering
06:57
Dos/Ddos Attacks
-
Dos attack or Ddos attack
21:50 -
Bots,botnet,cnc
07:49 -
Different Technic of Dos & DDos attack
59:21 -
syn flooding ushing hping3
12:43 -
Low Orbit Ion Cannon (LOIC)
12:52 -
Live DDOS attack Perform
06:43 -
Fragmentation Attacks
10:57 -
SSH
56:18 -
DDOS attack Detection Techniques
05:22 -
DoS or DDoS Countermeasure Strategies
06:42 -
DoS Attack Penetration Testing
05:33
Session Hijacking
-
Session Hijacking Introduction
52:14 -
Live Hack Facebook account with the help of session hijacking
02:00 -
Session Hijacking Practical
54:48 -
usb hacking
14:49 -
Protecting againstΒ Session Hijacking
41:00 -
Evilginx Advance phising framework hijacking session or Bypass 2fa verification
01:42:00
Intrusion Detection System (IDS)
-
Firewall Detection
01:07:46 -
Honeypot Introduction
32:37 -
How to Establish a Honeypot on your network
45:18 -
Intrusion detection system
07:20
Hacking Web Servers
-
Hacking Web Servers
01:00:14 -
Live compromise Hacking server
56:28 -
How to compromise server part2
46:49 -
Cross-Site Scripting (XSS) attack
54:14
Hacking Web Applications
-
Hacking Web Applications
36:51 -
Hacking Web application Practical
31:03
SQL Injection
-
Sql Injection Introduction
51:23 -
Sqlmap
50:49 -
Login Bypass Using SQL Injection
38:50 -
How to setup Damn Vulnerable Web Application (DVWA) on localhost in Kali Linux or Windows
44:34 -
Using Metasploit with Command Execution
40:11
Wireless Networks Hacking
-
Wireless Terminologies
10:03 -
Wireless Standards
11:11 -
Types of Wireless Antennas
04:48 -
How to see connected WiFi password
08:18 -
Types of Wireless Encryption
10:54 -
Launch Wireless Attacks
04:16 -
How to Hack Wifi Password (Wifi Hacking)
01:23:12 -
Make own wifi jammer
08:08
ANDROID HACKING
-
How to Hack Android Phone Using Virus
08:33 -
Hack Android phone using metasploit payload
13:11 -
Hack android phone over the wan attack
01:02:31 -
How to bypass play protect
59:11 -
How to track any one live location
01:25:14 -
What is Termux How to intsall
02:23 -
What is cd command
06:15 -
What is ls command
05:51 -
What is cp command
02:55 -
How to find any command
05:29 -
What is mv command
02:59 -
How to install package or remove pkg
03:34 -
What is apt command
03:50 -
Find Github tools
07:14 -
Sending Sms or call using Termux
03:31 -
FUN WITH TERMUX
07:46 -
INSTALLΒ UBUNTUΒ ROOT TERMINALΒ INΒ YOUR TERMUX
04:40 -
How to use Ubuntu ROOT terminal
05:42 -
00:00
Internet of things Hacking
-
Iot Hacking
01:08:33 -
Live Car Remote signal Capture
24:29
Cloud Computing
-
Cloud Computing
58:13
Cryptography and its Types
-
What is Cryptography
10:43 -
Types of Cryptography
13:17 -
PGP Encryption or AES Encryption
09:14 -
Live Cracking code
09:35 -
Real life cryptography
11:27 -
what is Cryptoanalysis
08:23 -
Cipher Tools
08:31 -
GPG Encryption through kalilinux
04:33 -
Complete PGP GPG Encryption Decryption
20:26 -
Whatsapp Hacking – Decrypt Database end-to-end encryption
11:05 -
Decrypt The Code
10:19 -
What is Steganography
09:48 -
Real life Steganography technic
02:30 -
Hide a secret message in a image
09:08 -
Secure way Hide a secret message in a image
-
Hide a image in a document or notepade
10:15 -
Manual way hide message
12:47 -
How to use openpuff
07:47 -
Whitespace Steganography
07:14 -
Email Steganography
04:13 -
Folder Steganography
07:01 -
Audio Steganography
10:14
Bonus Really Carding Is Possible in India ?
Really Carding Is Possible in India ?
-
#1 Basic things Required for Carding
10:00 -
#2 Types of Cards for Carding
05:48 -
#3 How to do carding latest methods
05:35 -
#4 How to buy cc
07:34 -
#5 How to buy cc from FORMS
02:44 -
#6 How to Anonymous using socks
10:00 -
#7 LIVE CARDING
04:00
Programming in C
-
Introduction To C Language
10:55 -
Programing Language
19:45 -
Generation of Programing Language
14:02 -
Flow chart
14:42 -
Installation C
07:11 -
C Program Structure
12:33 -
Tokens in c
10:41 -
Constant or Variable in C
21:55 -
Character in C
24:47 -
use of char
12:41 -
How to work clrscr or getch
09:08 -
Bytes in C
15:29 -
Use of Float
06:15 -
Float Example
08:36 -
Float Example 2
14:04 -
Input output
06:53 -
Input output Usages
07:54 -
Unformatted functions
11:55 -
Operator
08:39 -
Relational or Logical Operator
11:23 -
Conditional Operators
23:46 -
Bitwise Operator
10:44 -
Logical And Example
09:57 -
Operators Precedence
06:13 -
Control Statements If
12:55 -
If Statement
10:18 -
If else or Nested if
06:11 -
Switch Statement
14:23 -
Loop
07:36 -
Nested loop
08:19 -
Pattern Program
14:04 -
Jumping Statement
05:42 -
Function
09:42 -
Function call
18:23 -
Function Types
05:41 -
Recursion
05:23 -
Arrays
14:09 -
Arrays Types
07:13
Bonus
-
Surface Web & Dark Web Explained with LIVE DEMO How To Install & Use TOR Browser in HINDI 2022
20:21
Additional Topics
-
Evilginx Advance phising framework hijacking session or Bypass 2fa verification
01:41:00 -
Nessus Installation 2024
38:00 -
Unleashing the Power of WiFi Pineapple: Step-by-Step Setup and Attack Practicals in India in hindi
01:50:39
Student Ratings & Reviews
4.8
Total 40 Ratings
5
34 Ratings
4
4 Ratings
3
2 Ratings
2
0 Rating
1
0 Rating
best
Very nice this course
very good
it was ok ok
Best online platform for course
one of the best institute
it is very informative course and teaching is also good
very good all faculity are good
amazing
course
course
awosme
Great
kuch khas nahi hai ha but thik hi haii
all best courses
ππ»
amazing website for learning cyber secority ethical haking course.
Very Good Course for me
they show my way where to intrested and also clear my confusion. this is helpful courses for me. I disappointed only one thing they didn't update the video according to latest way n latest tool
thanku sir that's a better platform of new user cyber squard
good
great
