All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 3 Days!

Browse Library

Get Unlimited Learning Access
3 days left at this price!
30-Day Money-Back Guarantee

It Includes

  • Get Full Access to the platform
  • Access to 16000+ online courses
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Assignments & Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Free Instructor Support
  • Access valid for 1 user only
  • Cancel Anytime
  • Transfom your Android Device into an Advance Ethical Hacking Machine
  • Instagram Hacking like pro ATTACKER and make people people aware of such an attack
  • Facebook Hacking like pro ATTACKER and make people people aware of such an attack
  • Any Social Media Hacking as PRO Attacker and make people people aware of such an attack
  • Metasploit Framework
  • Learn how to Use Termux from Scratch
  • PORT Forwarding
  • Clone any Website
  • What is Shell ?
  • BASH Scripting
  • What is F-Droid and its Importance
  • Package Management
  • Learn various CLI commands and use it like a Pro Penetration Tester
  • LAN Attack
  • WAN Attack
  • Learn how to make Persistent Payload
  • Cyber Security Terminology
  • Metasploit Architecture
  • Phishing Attack
  • Run Kali Linux in your Android Device without Root
  • Vulnerability , Exploit , Payload
  • Bind Shell and Reverse Shell
  • PHP Programming
  • Ways to Prevent Cyber Attacks
  • 3 Essential Tools of Encryption and Decryption
  • Learn Encryption and Decryption
  • How to access the Front Camera of the Victim
  • Protect Your files with Passwords
  • Installing PHP and Starting the Server
  • Convert your Phishing Website into an Android App
  • Wifi Password Cracking
  • using of Hackers KeyBoard
  • Social Engineering

Hello Everyone !

Welcome to the CAEHP i.e. the Complete Android Ethical Hacking Practical Course .

My name is DEBAYAN DEY and i will be your Instructor for the CAEHP Course.

CAEHP is one of the Most Comprehensive Real World  100%  Hands-On Practical Approach on Android Ethical Hacking...!!!

Now this course is designed for anyone who is interested in learning how an attacker attack and get the information from the victim.

CAEHP is designed by keeping in mind that most of us are not having laptops or computer machine to work for most of the time.  Thats why in this course curriculum , you need not require any laptop or computer system.

Only you need an android device and this entire course is 100% practical based !

isn't this amazing ???

Yess , plus the most important thing , you need not to root your Android device.

waaoo !!! so all in one ,  you just require an android phone and turn it into powerful ethical hacking machine.

Lil brief about my name ,   i am Certified Secure Computer User (CSCU) v2 , and Certified Ethical Hacker (CEH V10) from EC COUNCIL

also i am certified Google IT support from Google , and currently doing  micromaster  in the Field of Cyber Security from Rochester institute of technology (RIT) New York in edx .

here are few of my other accomplishments in the field of cyber security ,

  • Introduction to Cyber Attacks , New York University

  • introduction to Cyber security for business , University of Colorado System

  • Palo Alto Networks academy cybersecurity foundation  , Palo alto networks

  • International cyber conflicts  , The State University of New York

  • Cyber Attacks Countermeasures , New York University

  • Networking ans security Architecture with Vmware NSX

  • Enterprise System Management and security ,University of Colorado System

Rest we'll have a meet and greet section to know other Learners ...!!!

so whats there in this CAEHP COURSE?

First of all i would love to  tell you , that this course is not limited  to time .

You may see 6 or 7 section today , once you land in this course after few weeks , you'll see more sections and videos are added up.  so this is the advantage of taking this course that you'll get regular updates about the new features and attacks and how you , as an individual can prevent yourself  from such an attack.


so currently in CAEHP course  , we have 6 Section + 1 Optional Section and 1 Bonus Section



  • Meet and Greet

  • Introduction of the Section

  • What is Termux ?

  • What is Shell ?

  • Why Termux ?

  • Installation

  • What is F-Droid ?

  • Package Management

  • Q/A Session with instructor  and  various Social Media availability

So , we'll turn our Android device to a complete ethical hacking powerful device by installing termux.



  • Next we'll cover , termux basics by learning various CLI commands.

  • Installing TERMUX from Google Play Store

  • Storage Setup , Update and Upgrade

  • Learn why we use apt

  • hidden files , versions

  • Various Text Editor

  • Learn how to check IP

  • Various other Network Related Commands

  • Learn why we change various modes

  • Learn how to use GIT Repository

  • and much more cool stuffs...!!!!



  • There after we'll cover one of the most powerful tool in penetration testing and ethical hacking , i.e. Metasploit Framework.

  • We'll see  how an attacker create payloads

  • perform LAN   and WAN i.e local area  network and wide area network attacks

  • using port forwarding

  • and how the attacker creates persistent Payload

  • Learn BASH Scripting

  • and how an attackers takes the control of the victims mobile device and get all the data.

  • and much more cool stuffs...!!!


  • next we'll learn what is Encryption

  • what is Decryption

  • how we can encrypt our files

  • how we can Decrypt our files

  • Learn how we can protect our files and folders with passwords

  • so in this section we'll cover installation of 3 very important tools used for Encryption and Decryption in Linux

  • What is SALT in Cyprography ?

  • Further we'll learn how we can perform Encryption and Decryption

  • and much more cool stuffs...!!!


  • most exciting Section

  • Introduction

  • What is Phishing Attack ?

  • We gonna learn  how an attacker do phishing attacks.

  • here we'll mirror any website

  •   We'll also learn how we can clone Facebook , Instagram , twitter or any social media

  • installation of PHP

  • starting of PHP server 

  • Run the Cloned Website in your LocalHost

  • Then uploading  the files online

  • Run the Cloned Website Online

  • Learn Social Engineering

  • Share the link to the Victim and get the Username and the Password once the Victim tries to Login

  • and then creating an app of the cloned website

  • Share the Android App with the victim

  • Again learn how to do Social Engineering so that the Victim downloads the App

  • Get the Username and the Password once the Victim tries to Login from the APP

  • So in this section , we'll see how an attacker sends a link or an app to the victim and once the victim tries to login with login credentials , bang , victims password is with the attacker .

  • and much more cool stuffs...!!!!



  • next section is pretty much interesting

  • we'll see how we can do port forwarding

  • generate an HTTP or HTTPS  url Link

  • how by simply sending a link  an attacker gets complete camera access

  • and receives the photographs after every few interval of time of the victim.

  • Next we'll see how to Uninstall such Dangerous Package

  • We will learn how to stay safe

  • Prevent from getting Hacked

  • Learn how to Aware your Family Members and known person by teaching them how to stay protected

  • and much more cool stuffs...!!!!



  • this section named as optioal section , we gonna cover various tools which can be very handy for the rooted android device.

  • Ok so those who are having rooted android device can go through this section.

  • Learn working of  Wifi Network

  • Learn what is AIRCRACK-NG

  • Installation of the package

  • Learn how to use AIRMON-NG

  • and much more cool stuffs to be added up...!!!!



  • and last but not the least  we have bonus section.

  • We'll see how we'll  run kali Linux in our Android device

  • No need to Root your Android Device

  • Apps to install

  • Installation of Kali Linux

  • Learn using SSH Client

  • Turn your Android Device into a Penetration Testing and Ethical Hacking Device

  • and much more cool stuffs to be added up...!!!!


So all the sections will cover Quizzes , Assignments and Reading Materials .

Also , all the sections will be updated on regular basis and new sections will also be added up , so once you are enrolled in the course , you'll surely gonna learn various techniques how attackers attack and how we can safe ourselves from getting attacked.


  • Most importantly , this course is completely for educational purpose


  • all the attacks which an attacker perform  are demonstrated to you so that you understand the technology and the art behind it and you're not fooled by any kind of social engineering.


  • This course is for educational and awareness purpose , to make everyone aware and be safe and protect your data.


  • Its a request , please do not perform any illegal activities ,  me ( Debayan Dey ) is not responsible for  your illegal activities you perform.


so, Welcome to the world of  complete android Ethical hacking  practical course.


Feel Free to Reach out at any point of time , i will be happy to Help you , and if you face any PROBLEM , just post your DOUBTS , you will be Answered within 24hrs to 48hrs of time ..!!!!!


ARE YOU EXCITED to learn 100% complete practical course  and help your family stay secured and safe from data theft and from hackers ?

Wish you all the best...!!!!

See you in the course landing page ....!!!!

  • Android Device
  • Internet
  • No Computer
  • No Laptop
  • Ethical Hacking Mindset
  • zeal to learn
  • Share your learning to your family , friends and everyone you know by making them aware about the cyber Attacks
  • No Illegal Activities
  • Mobile Hacking
  • Beginners who want to Learn Cyber Security
  • Android Hacking
  • Beginners who are curious about Ethical Hacking
  • Beginner BASH Scripting
  • Learn Phishing Attack
  • PHP Programmers who wants to learn Ethical Hacking
  • Learn Social Engineering and help others by sharing your knowledge and making them aware
  • Metasploit Framework
View More...
  • Section 1 : Introduction to Course 7 Lectures 00:07:20

    • Lecture 1 :
    • Lecture 2 :
    • What is Termux ?
    • Lecture 3 :
    • What is Shell ?
    • Lecture 4 :
    • Why Termux ?
    • Lecture 5 :
    • Installation
    • Lecture 6 :
    • what is F-Droid ?
    • Lecture 7 :
    • Package Management
  • Section 2 : Termux Basics 21 Lectures 00:56:15

    • Lecture 1 :
    • Installing TERMUX from Google Play Store
    • Lecture 2 :
    • Storage Setup , Update and Upgrade Command
    • Lecture 3 :
    • Why we use apt ?
    • Lecture 4 :
    • Remove Package
    • Lecture 5 :
    • apt-show
    • Lecture 6 :
    • hidden files , versions and CD commands
    • Lecture 7 :
    • Nano and Cat commands
    • Lecture 8 :
    • PWD and touch command
    • Lecture 9 :
    • mkdir command
    • Lecture 10 :
    • use of cd command
    • Lecture 11 :
    • use of mv command
    • Lecture 12 :
    • use of rm command
    • Lecture 13 :
    • mix use of " cp , mv and touch " command
    • Lecture 14 :
    • use of uname command
    • Lecture 15 :
    • use of ifconfig command
    • Lecture 16 :
    • know your IP address
    • Lecture 17 :
    • use of Ping command
    • Lecture 18 :
    • use of "chmod" command
    • Lecture 19 :
    • use of cal and proc command
    • Lecture 20 :
    • use of git clone and wget command
    • Lecture 21 :
    • use of cp command
  • Section 3 : Metasploit Framework 23 Lectures 02:12:15

    • Lecture 1 :
    • What is Penetration Testing ?
    • Lecture 2 :
    • What is Metasploit Framework and its History
    • Lecture 3 :
    • basic architecture of Metasploit
    • Lecture 4 :
    • Basic Terminologies " Vulnerability"
    • Lecture 5 :
    • Basic Terminologies " Exploit"
    • Lecture 6 :
    • Basic Terminologies " Payload"
    • Lecture 7 :
    • Module in Architecture of Metasploit
    • Lecture 8 :
    • What is Shell , Bind Shell , Reverse Shell
    • Lecture 9 :
    • Initial Steps , ways to Prevent these Attacks and Conclusion
    • Lecture 10 :
    • installation of CPU-Z
    • Lecture 11 :
    • Metasploit Installation
    • Lecture 12 :
    • alert for Database Server
    • Lecture 13 :
    • Test the Metasploit Framework and learn what is MSFconsole
    • Lecture 14 :
    • Help Command and Banner Command
    • Lecture 15 :
    • Show Command ( no audio )
    • Lecture 16 :
    • Show , Search Info , Use commands
    • Lecture 17 :
    • Metasploit exploit over the LAN explaination
    • Lecture 18 :
    • complete exploit over the LAN
    • Lecture 19 :
    • Port Forwarding Demonstration with Data is Turned on along with hotspot (failed)
    • Lecture 20 :
    • Hotspot Failure ( turning OFF again and again )
    • Lecture 21 :
    • Getting confused with the LPORT while we are doing with WIFI
    • Lecture 22 :
    • learning from our mistakes perfectly working this time with wifi ( no audio)
    • Lecture 23 :
    • Making our payload PERSISTENT
  • Section 4 : Protect your files with Encryption 5 Lectures 00:21:51

    • Lecture 1 :
    • What is encryption and decryption
    • Lecture 2 :
    • Tool1
    • Lecture 3 :
    • Tool2
    • Lecture 4 :
    • Tool3 and what is "salt" explained
    • Lecture 5 :
    • Tool3 Continued "decryption"
  • Section 5 : Phishing Attack and how to Prevent Unknown Threats 7 Lectures 00:41:39

    • Lecture 1 :
    • Section Introduction
    • Lecture 2 :
    • What is Phishing Attack ?
    • Lecture 3 :
    • Mirroring Website
    • Lecture 4 :
    • Installing PHP and starting the Server in localhost with port number
    • Lecture 5 :
    • Generated the password in localhost
    • Lecture 6 :
    • Uploading files in webhosting platform
    • Lecture 7 :
    • Convert your website to an Android APP
  • Section 6 : How an attacker access your Front Camera 3 Lectures 00:14:22

    • Lecture 1 :
    • Know the Tool which attackers use to access the Camera
    • Lecture 2 :
    • How to perform the attack
    • Lecture 3 :
    • How to uninstall the Tool
  • Section 7 : Access Front Camera and Back Camera of your Victims Android Device 100% Working 4 Lectures 00:29:43

    • Lecture 1 :
    • 1. what is **** ( Tool Name ) and its Cloning from GitHub
    • Lecture 2 :
    • 2 changing the TOOL to full executable mode
    • Lecture 3 :
    • Attempt with Option 1 and its a Success
    • Lecture 4 :
    • Attempt with Option 2 and its again a Success
  • Section 8 : Reward Section 1 Lectures 00:09:10

    • Lecture 1 :
    • Learn how to install Kali Linux in non rooted android device
  • How do i access the course after purchase?

    Once you purchase a course (Single course or Subscription), you will be able to access the courses instantly online by logging into your account. Use the user name & password that you created while signing up. Once logged in, you can go to the "My Courses" section to access your course.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certification after completing the course?

    Yes. Once you succesfully complete any course on Learnfly marketplace, you get a certiifcate of course completion emailed to you within 24 hours with your name & the Learnfly badge. You can definately brag about it & share it on your social media or with friends as one of your achievement. Click here to view the sample certificate Click Here
  • For how long can i access my course after the purchase?

    If you buy a single course, that course is accessible to you for a lifetime. If you go for a premium subcription, you can access all the courses on Learnfly marketplace till your subscription is Active.
  • Whats the difference between Single Course Purchase & Go Premium option?

    With Single Course Purchase, you only get an access of one single course. Whereas, with premium monhtly or annual subscription, you can access all the existing or new courses on learnfly marketplace. You can decide what option suits you the best and accordingly you can make your purchase.
  • Is there any free trial?

    Currently, we don't have any free trial but it may be available in near future.
  • What is the refund policy?

    We would hate you to leave us. However, if you are not satisfied, you can ask for a full refund within 30 days & we will be happy to assist you further.
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lecture 80
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lecture 17
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lecture 6
  • cissp-certification-introduction

    CISSP- Certification Introduction


    Lecture 18
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lecture 40
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lecture 30
Signup & Continue Checkout
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.