The Complete Android Ethical Hacking Practical Course C|AEHP

FREE $19.99

Hello Everyone !

Welcome to the CAEHP i.e. the Complete Android Ethical Hacking Practical Course .

My name is DEBAYAN DEY and i will be your Instructor for the CAEHP Course.

CAEHP is one of the Most Comprehensive Real World 100% Hands-On Practical Approach on Android Ethical Hacking…!!!

Now this course is designed for anyone who is interested in learning how an attacker attack and get the information from the victim.

CAEHP is designed by keeping in mind that most of us are not having laptops or computer machine to work for most of the time. Thats why in this course curriculum , you need not require any laptop or computer system.

Only you need an android device and this entire course is 100% practical based !

isn’t this amazing ???

Yess , plus the most important thing , you need not to root your Android device.

waaoo !!! so all in one , you just require an android phone and turn it into powerful ethical hacking machine.

Lil brief about my name , i am Certified Secure Computer User (CSCU) v2 , and Certified Ethical Hacker (CEH V10) from EC COUNCIL

also i am certified Google IT support from Google , and currently doing micromaster in the Field of Cyber Security from Rochester institute of technology (RIT) New York in edx .

here are few of my other accomplishments in the field of cyber security ,

Introduction to Cyber Attacks , New York University

introduction to Cyber security for business , University of Colorado System

Palo Alto Networks academy cybersecurity foundation , Palo alto networks

International cyber conflicts , The State University of New York

Cyber Attacks Countermeasures , New York University

Networking ans security Architecture with Vmware NSX

Enterprise System Management and security ,University of Colorado System

Rest we’ll have a meet and greet section to know other Learners …!!!

so whats there in this CAEHP COURSE?

First of all i would love to tell you , that this course is not limited to time .

You may see 6 or 7 section today , once you land in this course after few weeks , you’ll see more sections and videos are added up. so this is the advantage of taking this course that you’ll get regular updates about the new features and attacks and how you , as an individual can prevent yourself from such an attack.

so currently in CAEHP course , we have 6 Section + 1 Optional Section and 1 Bonus Section


Meet and Greet

Introduction of the Section

What is Termux ?

What is Shell ?

Why Termux ?


What is F-Droid ?

Package Management

Q/A Session with instructor and various Social Media availability

So , we’ll turn our Android device to a complete ethical hacking powerful device by installing termux.


Next we’ll cover , termux basics by learning various CLI commands.

Installing TERMUX from Google Play Store

Storage Setup , Update and Upgrade

Learn why we use use of apt

hidden files , versions

Various Text Editor

Learn how to check IP

Various other Network Related Commands

Learn why we change various modes

Learn how to use GIT Repository

and much more cool stuffs…!!!!


There after we’ll cover one of the most powerful tool in penetration testing and ethical hacking , i.e. Metasploit Framework.

We’ll see how an attacker create payloads

perform LAN and WAN i.e local area network and wide area network attacks

using port forwarding

and how the attacker creates persistent Payload

Learn BASH Scripting

and how an attackers takes the control of the victims mobile device and get all the data.

and much more cool stuffs…!!!


next we’ll learn what is Encryption

what is Decryption

how we can encrypt our files

how we can Decrypt our files

Learn how we can protect our files and folders with passwords

so in this section we’ll cover installation of 3 very important tools used for Encryption and Decryption in Linux

What is SALT in Cyprography ?

Further we’ll learn how we can perform Encryption and Decryption

and much more cool stuffs…!!!


most exciting Section


What is Phishing Attack ?

We gonna learn how an attacker do phishing attacks.

here we’ll mirror any website

We’ll also learn how we can clone Facebook , Instagram , twitter or any social media

installation of PHP

starting of PHP server

Run the Cloned Website in your LocalHost

Then uploading the files online

Run the Cloned Website Online

Who this course is for:
Mobile Hacking
Beginners who want to Learn Cyber Security
Android Hacking
Beginners who are curious about Ethical Hacking
Beginner BASH Scripting
Learn Phishing Attack
PHP Programmers who wants to learn Ethical Hacking
Learn Social Engineering and help others by sharing your knowledge and making them aware
Metasploit Framework
Learning Cryptography


Even Your Small Donation Will Help Us to Keep This Platform Alive

Be The 2nd to Donate

Learning Army