Flash Sale: Get Upto 75% off on all courses. Browse the courses below to see available discounts and offers. Valid till:

Learn Kali Linux To Hack Android Devices

Learn Kali Linux To Hack Android Devices

Best Seller 3.5 ( 1 ratings)

Instructed by Mohamed Atef

Access all courses with Premium Subscription

  • Monthly
  • Yearly

Monthly

$ 29/mo
Billed Monthly
  • All Courses Access
  • New Courses Instant Access
  • Learning paths Access
  • Course completion certificates
  • Skills Assessment
  • Instructor Support
  • Exercise files & Quizzes
  • Resume & Play
  • Mobile and TV apps
  • Offline viewing
  • Cancel Anytime
Subscribe Now

Yearly

$ 299/yr
Billed Anually
  • One Year Unlimited Access
  • New Courses Instant Access
  • Learning paths Access
  • Course completion certificates
  • Skills Assessment
  • Instructor Support
  • Exercise files & Quizzes
  • Resume & Play
  • Mobile and TV apps
  • Offline viewing
  • Cancel Anytime
Subscribe Now
  • Learn Basic Hacking Skills
  • Learn Kali Linux
  • Learn The Major Tools Of Kali Linux
  • Setup Testing Lab
  • Learn How To Hack Android Devices
  • Learn How To Hack Using Android Devices
  • Learn Exploitation Techniques
  • Learn Metasploit Basics

Most of today Ethical Hacking and Penetration testing courses are focusing on how to compromise computers  with Windows and Linux platform while right now most peoples are keeping all their critical data (Emails, Contacts, SMS, Personnel files) on Smart phones and tablet that use different platform like Android and doesn't have the same layers of security like PC's and accordingly peoples may think that their data is safe because they have an Anti Virus  and Firewall on their computers while the true is that all the data is replicated on their smart phone or another android devices that is very easy to compromise. 

This course consist of three different parts,first parts is about Kali Linux which will be used as Hacking platform, second part is about how to hack Android devices and third part is how to hack using Android devices, finally i would like to clarify that the course will be updated frequently with all new Android vulnerabilities and the exploitation techniques.

  • Basic knowledge of computer hardware, software, and operating systems
  • You
  • Students who are intersted in learning Hacking skills speically in Android platform.
  • Penetration Testers
View More...

Section 1 : Penetration Testing

  • Lecture 1 :
  • Lecture 2 :
  • Disclaimer
  • Lecture 3 :
  • Android Devices

Section 2 : Setup Your Lab

  • Lecture 1 :
  • Setup Your Virtual Machines
  • Lecture 2 :
  • Setting Your Workspace
  • Lecture 3 :
  • Setup Your Android Platform

Section 3 : Finding Your Way Around Kali

  • Lecture 1 :
  • Kali Linux
  • Lecture 2 :
  • Sharing Files Between Kali Linux And Windows
  • Lecture 3 :
  • Update and Upgrade Kali Packages

Section 4 : Important Tools

  • Lecture 1 :
  • Netcat
  • Lecture 2 :
  • Grabbing Banner
  • Lecture 3 :
  • Transferring Files With Netcat
  • Lecture 4 :
  • Remote Administration Using Netcat
  • Lecture 5 :
  • Android Netcat
  • Lecture 6 :
  • Ettercap
  • Lecture 7 :
  • Ettercap Basic
  • Lecture 8 :
  • DNS Poisoning Using Ettercap
  • Lecture 9 :
  • Scanning A System Using NMAP

Section 5 : Exploitation

  • Lecture 1 :
  • Working With Exploit
  • Lecture 2 :
  • Android Exploit
  • Lecture 3 :
  • Metasploit
  • Lecture 4 :
  • Armitage
  • Lecture 5 :
  • Different Armitage Usage

Section 6 : Hacking Android Devices

  • Lecture 1 :
  • Android Attack 1-1
  • Lecture 2 :
  • Android Attack 1-2
  • Lecture 3 :
  • Using Meterpreter Session
  • Lecture 4 :
  • Countermeasure
  • Lecture 5 :
  • Android Attack Using Armitage
  • Lecture 6 :
  • Stagefright Attack
  • Lecture 7 :
  • Countermeasure
  • Lecture 8 :
  • Social Engineering Toolkit
  • Lecture 9 :
  • Fix SET If Needed
  • Lecture 10 :
  • Android Attack 2
  • Lecture 11 :
  • Android Attack 3
  • Lecture 12 :
  • Countermeasure
  • Lecture 13 :
  • Install Notepad++ In Kali Linux
  • Lecture 14 :
  • Bind A Payload In A Regular APK

Section 7 : Social Engineering

  • Lecture 1 :
  • Spoof Email
  • Lecture 2 :
  • Countermeasure
  • Lecture 3 :
  • Spoofed Mobile Number
  • Lecture 4 :
  • Spoofed SMS
  • Lecture 5 :
  • Countermeasure

Section 8 : Hacking Using Android Devices

  • Lecture 1 :
  • Network Spoofer
  • Lecture 2 :
  • Root A Device
  • Lecture 3 :
  • Bugdroid
  • Lecture 4 :
  • DSPLOIT
  • Lecture 5 :
  • Countermeasure

Section 9 : Remote Attacks On Android

  • Lecture 1 :
  • Port Forwarding
  • Lecture 2 :
  • Hacking Remotely Demonstration

Mohamed Atef,

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience. CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
View More...

Average Rating

3.5

Detail

5 Stars
0% Complete (success)
0%
4 Stars
0% Complete (success)
0%
3 Stars
100% Complete (success)
100%
2 Stars
0% Complete (success)
0%
1 Stars
0% Complete (success)
0%

amurta rao

posted 12 days ago

Ethical Hacking and Penetration Tes...

By : Darshil Modi

Lecture 21

Implementing & Configuring Cisco Ro...

By : Dariusz Lipski

Lecture 10

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

The Complete Ethical Hacking Certif...

By : Mohamed Atef

Lecture 151

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

Need any help with the platform? Contact us at: support@learnfly.com