Address
vijayawada,Andhrapradesh, India
Welcome to Cybersec Academy Telugu!
Are you ready to embark on a journey into the world of cybersecurity?
Explore our online shop, get in touch with us, or log in to access exclusive content.
Ethical Hacking Course A-Z by Mr_Kali_Hacker
Language: Telugu
Created by: Mr_Kali_Hacker
Duration: 18+ hours
Course Size: 1.7 GB (includes resources)
Videos: 26
Video Screen Resolution: Full HD 1920×1080
In this course, we provide you with all the tools, software, and videos you need to learn hacking. And the best part? You can learn hacking in your mother tongue!
What you will learn:
1. Introduction: Why and how hacking is important
- Is programming language required? What and why?
2. Labs used and their importance
- Installing and explaining labs to make you comfortable with them
- Understanding Windows, Linux, OS, and applications
- Terminal and GUI concepts
- What is ping?
3. Linux basics and Windows basics
- Command line usage cheat sheets
- Linux and Windows file systems
4. OSI model, TCP/IP model, protocols, and ports
- Creating and overviewing labs
5. Network hacking
- Theory and practical applications
- Understanding HTTP, HTTPS, HSTS
- Client-server architecture
- Network penetration testing
- Basic network concepts
- Tools used
6. Client-side attacks
- Tools used
- Hacking Android, Windows, Linux
- Viruses, worms, Trojans
- Hacking tools and techniques
- Remote exploits
- Persistence
- Spyware
- Keyloggers
- Port forwarding
- Binding
- Delivering and much more
7. Website hacking
- Theory of client and server
- HTTPS, HSTS, protocols, and requests
- Setting up a local web server and database
- SQL language basics coverage
- Tools used
- Burp Suite usage
- Scanners
- Basics of web languages (HTML, JavaScript)
- Labs setup
- Information gathering
- OWASP Top 10 vulnerabilities
- Main focus on SQL injection, XSS, CSRF, LFI, XML external entity, RFI, parameter tampering
- Many more tools, methods, and concepts
7.1 Web server hacking
- Steps of hacking
- Step-by-step theory and demonstration
- Using Metasploitable2 and real-world machines
8. Cryptography
9. DoS and DDoS attacks
10. Malware analysis and reverse engineering
11. Solving CTFS in Hack The Box
12. Social media hacking and cracking: theory and practicals
- Phishing
- Brute force
- Android PIN brute force (our tool)
Disclaimer: The content provided is for informational and educational purposes only. All practice demos are performed on our own devices or networks. We are not responsible for any actions taken.
Labs, Devices, and Software we use:
Web Goat, DVWA, Mutilladae, Metasploitable2, Juice Shop, various CTFS, Windows 10/8.1/7/11, SQLi Labs, Android 5/11, LFI/RFI labs, Kali and GitHub tools, Kali Linux, Ubuntu, LinuxLite, and many more.
Requirements: Basic knowledge of computers
Share the knowledge and empower yourself in the world of cybersecurity!
Comprehensive Course Content: Our courses cover a wide range of cybersecurity topics, including network security, web application security, mobile security, cloud security, and more. Our course content is regularly updated to keep up with the latest trends and technologies in the field.
Flexible Learning Options: We understand that our students have busy schedules, which is why we offer flexible learning options, including online and offline classes, and the ability to learn at your own pace.
Ongoing Support: We offer ongoing support and guidance to our students, including personalized attention from instructors, access to a community of like-minded peers, and mentorship to help them achieve their goals.
MR_KALI_HACKER
store owner
Hi, my name is MR_KALI_HACKER, and I have been involved in the hacking community for the past six years. During this time, I have developed a deep understanding of hacking techniques and how they can be used to exploit vulnerabilities in various systems. I am passionate about sharing my knowledge with others and have created a range of hacking courses and books to help people learn more about this fascinating subject.
I also teach people live online, providing them with hands-on experience in hacking and helping them develop their skills. My goal is to provide a safe and ethical learning environment where people can explore the world of hacking and gain a better understanding of how to protect their own systems from potential attacks.Thank you for considering my courses and books. I am confident that they will provide you with a valuable learning experience and help you develop your skills as a hacker