Instructor Name

CyberEra

Category

Cyber Security

Reviews

0 (0 Rating)

Course Curriculum

1 Computer Fundarmentals
52 Min

Computer Fundarmentals


2 Introduction To Hacking
50 Min

Introduction To Hacking


3 Basic Network Terminology
41 Min

Basic Network Terminology


4 CIA | MAC | Proxy | Tor Network | VPN | OSI Model | TCP-IP Model
54 Min

CIA | MAC | Proxy | Tor Network | VPN | OSI Model | TCP-IP Model


5 Operating Systems - Linux & Tools & Software Requirements
24 Min

Operating Systems - Linux & Tools & Software Requirements


6 Virtualbox & Vmware Workstation Installation
8 Min

Virtualbox & Vmware Workstation Installation


7 Kali Linux Setup & Installation
40 Min

Kali Linux Setup & Installation


8 Parrot Security Setup & Installation
15 Min

Parrot Security Setup & Installation


9 Windows 7 Installation
35 Min

Windows 7 Installation


10 Windows 10 Setup & Installation
26 Min

Windows 10 Setup & Installation


1 Linux And Windows Basics
36 Min

Linux And Windows Basics


2 Windows Basic Commands
37 Min

Windows Basic Commands


3 Linux Basic Commands
1 Hour2 Min

Linux Basic Commands


4 Linux User's Permissions
34 Min

Linux User's Permissions


1 Footprinting Theory (Part 1)
55 Min

Footprinting Theory (Part 1)


2 Footprinting Theory (Part 2)
33 Min

Footprinting Theory (Part 2)


3 Footprinting Practical - Web Archive & Whois (Part 1)
54 Min

Footprinting Practical - Web Archive & Whois (Part 1)


4 Footprinting Practical - HTTRACK Website Copier (Part 2)
30 Min

Footprinting Practical - HTTRACK Website Copier (Part 2)


5 Footprinting Practical - Reverse IP Lookup & Maltego Introduction (Part 3)
36 Min

Footprinting Practical - Reverse IP Lookup & Maltego Introduction (Part 3)


6 Footprinting Practical - Maltego & HaveIBeenPwned (Part 4)
42 Min

Footprinting Practical - Maltego & HaveIBeenPwned (Part 4)


7 Footprinting Practical - Shodan & Shodan With Maltego (Part 5)
35 Min

Footprinting Practical - Shodan & Shodan With Maltego (Part 5)


8 Footprinting Practical - Google Dorks (Google Hacking) (Part 6)
44 Min

Footprinting Practical - Google Dorks (Google Hacking) (Part 6)


9 Footprinting Practical - WhatWeb & Wappalyzer (Part 7)
40 Min

Footprinting Practical - WhatWeb & Wappalyzer (Part 7)


10 Footprinting Practical - Subdomain Discover (Part 8)
25 Min

Footprinting Practical - Subdomain Discover (Part 8)


1 Scanning (Theory) (Part 1)
48 Min

Scanning (Theory) (Part 1)


2 Angry IP Scanner & NMap (Basic Practical) (Part 2)
40 Min

Angry IP Scanner & NMap (Basic Practical) (Part 2)


3 NMAP Basic Commands (Metasploitable 2 Machine) (Part 3)
5 Min

NMAP Basic Commands (Metasploitable 2 Machine) (Part 3)


4 NMAP Advcanced & Firewall, IDS Bypass Commands Part 4)
40 Min

NMAP Advcanced & Firewall, IDS Bypass Commands Part 4)


5 NMAP Scan Types & hping3 Scanning (Part 5)
40 Min

NMAP Scan Types & hping3 Scanning (Part 5)


6 Banner Grabbing Theory & Practical (Part 6)
36 Min

Banner Grabbing Theory & Practical (Part 6)


7 Vulenarability Scanning Theory & Practical (NSE & Nikto Web Vulnarability Scanner) (Part 7)
38 Min

Vulenarability Scanning Theory & Practical (NSE & Nikto Web Vulnarability Scanner) (Part 7)


8 WPScan Tool Practical (Part 8)
39 Min

WPScan Tool Practical (Part 8)


1 System Hacking Theory (Part 1)
47 Min

System Hacking Theory (Part 1)


2 Password List Through Crunch Tool Full Explaination (Part 2)
44 Min

Password List Through Crunch Tool Full Explaination (Part 2)


3 Password List Through Cupp Tool & Merge Wordlist Through dymerge tool (Part 3)
29 Min

Password List Through Cupp Tool & Merge Wordlist Through dymerge tool (Part 3)


4 hashcat Tool Practical (Part 4)
33 Min

hashcat Tool Practical (Part 4)


5 John The Ripper Tool Explain & Practical (Part 5)
20 Min

John The Ripper Tool Explain & Practical (Part 5)


6 hydra Tool Explain & Practical (Part 6)
1 Hour15 Min

hydra Tool Explain & Practical (Part 6)


7 hydra Tool Practical 2 (Part 7)
19 Min

hydra Tool Practical 2 (Part 7)


8 PassView Tool Practical & Autorun Pendrive Making For Stealing Browser Passwords (Part 8)
21 Min

PassView Tool Practical & Autorun Pendrive Making For Stealing Browser Passwords (Part 8)


9 MetaSploit Framework Introduction & Theory (Part 9)
19 Min

MetaSploit Framework Introduction & Theory (Part 9)


10 MetaSploit Practical - Hacked Live Machine (Part 10)
43 Min

MetaSploit Practical - Hacked Live Machine (Part 10)


11 Windows Hacking by MetaSploit (Local Network & Out Of Network) (Part 11)
1 Hour3 Min

Windows Hacking by MetaSploit (Local Network & Out Of Network) (Part 11)


12 Android Hacking by MetaSploit (Out Of Network) (Part 12)
29 Min

Android Hacking by MetaSploit (Out Of Network) (Part 12)


13 KeyLogger Theory(Part 13)
30 Min

KeyLogger Theory(Part 13)


14 Spywares Theory (Part 14)
28 Min

Spywares Theory (Part 14)


1 BurpSuite Basic Introduction, Working, Installation & Setup (Part 1)
51 Min

BurpSuite Basic Introduction, Working, Installation & Setup (Part 1)


2 BurpSuite Pro 2023 Installation & Setup With Firefox Browser (All Error Fixed)
30 Min

BurpSuite Pro 2023 Installation & Setup With Firefox Browser (All Error Fixed)


1 Critical File Found & Source Code Disclosure (Part 1)
43 Min

Critical File Found & Source Code Disclosure (Part 1)


2 Cross-Site Scripting (XSS) Theory & Basic Practical (Part 2)
38 Min

Cross-Site Scripting (XSS) Theory & Basic Practical (Part 2)


3 Cross-Site Scripting (XSS) Advanced Practical Through BurpSuite (Part 3)
42 Min

Cross-Site Scripting (XSS) Advanced Practical Through BurpSuite (Part 3)


4 SQL Injection Theory (Part 4)
37 Min

SQL Injection Theory (Part 4)


5 SQL Injection Manual (Part 5)
31 Min

SQL Injection Manual (Part 5)


6 Find Input Parameters & Automation SQL Injection With SQLMap (Part 6)
32 Min

Find Input Parameters & Automation SQL Injection With SQLMap (Part 6)


7 Automation Basic SQL Injection Through SQLMap (Part 7)
28 Min

Automation Basic SQL Injection Through SQLMap (Part 7)


8 Header Based & Cookie Based SQL Injection Vulnerability (Part 8)
20 Min

Header Based & Cookie Based SQL Injection Vulnerability (Part 8)


9 Website Admin Login Authentication Byapass (part 9)
38 Min

Website Admin Login Authentication Byapass (part 9)


10 HTML Injection (Part 10)
26 Min

HTML Injection (Part 10)


11 Host Header Injection (Part 11)
28 Min

Host Header Injection (Part 11)


12 File Uploading Vulnerability (Part 12)
1 Hour5 Min

File Uploading Vulnerability (Part 12)


13 Parameter Tampering (Price Tampering - Lab and Also On Live Website) (Part 13)
21 Min

Parameter Tampering (Price Tampering - Lab and Also On Live Website) (Part 13)


14 CSRF Vulnerability Theory & Practical (Part 14)
24 Min

CSRF Vulnerability Theory & Practical (Part 14)


1 Windows 8.1 Installation On VMWare Workstation (Part 1)
43 Min

Windows 8.1 Installation On VMWare Workstation (Part 1)


2 Virtual Android Phone Setup, JDK Installation & APK Tool Setup (Part 2)
32 Min

Virtual Android Phone Setup, JDK Installation & APK Tool Setup (Part 2)


3 Setup Port Forwarding Using Portmap.io & OpenVPN (Part 3)
28 Min

Setup Port Forwarding Using Portmap.io & OpenVPN (Part 3)


4 Hack Android Phone Using 888 RAT - Out Of Network Connection (Part 4)
30 Min

Hack Android Phone Using 888 RAT - Out Of Network Connection (Part 4)


5 Hack Android Phone Using CraxsRAT - Out Of Network Connection (Part 5)
32 Min

Hack Android Phone Using CraxsRAT - Out Of Network Connection (Part 5)


6 How To Bind Craxs RAT Payload (Virus) With Other APK (Part 6)
25 Min

How To Bind Craxs RAT Payload (Virus) With Other APK (Part 6)


7 How To Bypass Android Play Protect (Part 7)
26 Min

How To Bypass Android Play Protect (Part 7)


8 How To ByPass Android Play Protect | How To Run App In Background (Part 8)
35 Min

How To ByPass Android Play Protect | How To Run App In Background (Part 8)


1 How to scan any file & How to check virus fud or not. (Part 1)
31 Min

How to scan any file & How to check virus fud or not. (Part 1)


2 How to hack windows using XWorm RAT & PortMAP - Out of network (Part 2)
28 Min

How to hack windows using XWorm RAT & PortMAP - Out of network (Part 2)


3 Hack Windows 8.1 to 11 using 888 RAT & Portmap - Out of network (Part 3)
29 Min

Hack Windows 8.1 to 11 using 888 RAT & Portmap - Out of network (Part 3)


4 What is Crypter, Packer & Binder. How Crypter Tool Works (Part 4)
33 Min

What is Crypter, Packer & Binder. How Crypter Tool Works (Part 4)


5 Hack Windows Through mp3, mp4, txt Or Any File Format - Full Advanced Practical (Part 5)
40 Min

Hack Windows Through mp3, mp4, txt Or Any File Format - Full Advanced Practical (Part 5)


1 Dark Web Theory (Part 1)
30 Min

Dark Web Theory (Part 1)


2 TOR Browser Installation & Setup(Part 2)
43 Min

TOR Browser Installation & Setup(Part 2)


3 Dark Web Live Practical (Part 3)
46 Min

Dark Web Live Practical (Part 3)


4 Tails OS Live On Virtual Machine (Part 4)
31 Min

Tails OS Live On Virtual Machine (Part 4)


5 Private File Sharing & Host own website on Dark Web (Part 5)
21 Min

Private File Sharing & Host own website on Dark Web (Part 5)


1 Social Engineering Theory (Part 1)
45 Min

Social Engineering Theory (Part 1)


2 Facebook & Instagram Hacking - Phishing (Part 2)
42 Min

Facebook & Instagram Hacking - Phishing (Part 2)


3 Creating Free Bullet Proof RDP & Free Bullet Proof Hosting (Part 3)
1 Hour24 Min

Creating Free Bullet Proof RDP & Free Bullet Proof Hosting (Part 3)


4 How Hackers Hack & Bypass 2 Step Authentication Of Social Media & Other Famous Platforms (Part 4)
58 Min

How Hackers Hack & Bypass 2 Step Authentication Of Social Media & Other Famous Platforms (Part 4)


5 Social Engineering Toolkit - Kali Linux Tool (Part 5)
12 Min

Social Engineering Toolkit - Kali Linux Tool (Part 5)


6 How Hacker Force & Confuse User To Download App (Part 6)
23 Min

How Hacker Force & Confuse User To Download App (Part 6)


7 What Is NetCraft & Phishtank And How To Use IT (Part 7)
16 Min

What Is NetCraft & Phishtank And How To Use IT (Part 7)


8 Call Spoofing Advanced Practical - 3 Methods (Part 8)
47 Min

Call Spoofing Advanced Practical - 3 Methods (Part 8)


1 Cryptography Theory & Symmetric Cryptography Practical (Part 1)
25 Min

Cryptography Theory & Symmetric Cryptography Practical (Part 1)


2 Asymmetric Cryptography & Hash Function Explained With Practical (Part 2)
28 Min

Asymmetric Cryptography & Hash Function Explained With Practical (Part 2)


3 Steganography Explained With Practical (Windows & Kali Linux) (Part 3)
35 Min

Steganography Explained With Practical (Windows & Kali Linux) (Part 3)


1 Termux Basics, Termux Installation & Setup, Installed Required Packages (Part 1)
47 Min

Termux Basics, Termux Installation & Setup, Installed Required Packages (Part 1)


2 How To Fix Termux Error Using ChatGPT (AI), How To Use ChatGPT, SMS Bombing Using Termux (Part 2)
50 Min

How To Fix Termux Error Using ChatGPT (AI), How To Use ChatGPT, SMS Bombing Using Termux (Part 2)


1 Wi-Fi Hacking Theory (Part 1)
10 Min

Wi-Fi Hacking Theory (Part 1)


2 Wi-Fi Hacking Practical (Part 2)
51 Min

Wi-Fi Hacking Practical (Part 2)


1 Sniffing Theory (Part 1)
11 Min

Sniffing Theory (Part 1)


2 Sniffing Practical
33 Min

Sniffing Practical


3 Session Hijacking Practical (Part 3)
20 Min

Session Hijacking Practical (Part 3)


4 How Hackers Hack Any Accounts Without Any Passwords (Using Cookies)
15 Min

How Hackers Hack Any Accounts Without Any Passwords (Using Cookies) Live Practical Of NetFlix & Instagram


1 DOS & DDOS Attack Theory (Part 1)
26 Min

DOS & DDOS Attack Theory


2 DOS & DDOS Attack Practical (Part 2)
24 Min

DOS & DDOS Attack Practical


Instructor

Administrator

CyberEra

Administrator

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

0 Rating
0 Reviews
18 Students
6 Courses

CyberEra | CYBER AND INFORMATION, DATABASE, RESEARCH & DEVELOPMENT CYBER SECURITY, CYBER CRIME INVESTIGATION, WEBSITE & APP DEVELOPMENT, DIGITAL MARKETING TRAININGS & CERTIFICATIONS

Student Feedback

CCSE (CYBERERA CERTIFIED CYBER SECURITY EXPERT)

0

Course Rating
0.00%
0.00%
0.00%
0.00%
0.00%

No Review found

Sign In or Sign Up as student to post a review

Reviews

Course you might like