Online Ethical Hacking Course | Learn various Ethical Hacking Tips & Tricks | ChalkStreet

Ethical Password Hacking and Protection

Learn different password hacking techniques, protection methods and much more by subscribing to this course.

749

Level
Beginner
# Learners
2
Duration
42 mins
Rating
(0)

About Course

Internet penetration in India is growing at a very rapid pace. Advancement in technology has enabled us to perform tasks with electronic gadgets at our own comfort level. As a result, there is also a significant increase in cyber crimes. A recent study has shown that every internet user maintains an average of 8-10 passwords. Despite continuous communication from the companies to maintain strong passwords, we still see a lot of cases of password hacking on a daily basis. So, therefore it is very important to have an idea on how the hacking works and the steps to be taken to avoid getting hacked.

This course on ‘Ethical hacking and password protection’ in terms of protecting yourself from hacking threats. This course will explain various password hacks and the protecting methods in detail. The author demonstrates the various hacks such as keylogger, guessing, brute force, phishing and social engineering methods and also explains the countermeasures for each of them to protect your email, Wifi and other passwords.

This course is best suited for those:

  1. Who are looking to join the field of ethical hacking and security as a profession.
  2. Any internet user who wants to know about password protection tips.
  3. Internet entrepreneurs who want to improve the security.

Curriculum

Section 1 : Keylogger
1.1
Introduction
00:41
1.2
Keylogger process
03:27
1.3
Software for keylogger
01:42
1.4
Counter measures for keylogger
01:09

Section 2 : Guessing
2.1
Introduction
00:28
2.2
Guessing password
01:58
2.3
Software for brute force
01:53
2.4
Brute force with help of guessing
01:27
2.5
Counter measures for guessing
00:59

Section 3 : Brute force
3.1
Introduction
00:32
3.2
What you need for brute force
01:53
3.3
Wifi password hacking through bruteforce
02:20
3.4
Hacking through brute force and guessing
01:27
3.5
Counter measures for brute force
02:23

Section 4 : Phishing
4.1
Introduction
00:29
4.2
What you need for phishing
01:53
4.3
Password hacking through phishing
03:50
4.4
Counter measures for phishing
00:37

Section 5 : Social Engineering
5.1
Introduction
01:20
5.2
Social engineering through human method
05:47
5.3
Social engineering through computer method
04:56
5.4
Counter measures for social engineering
01:30

About the Author

Amit Huddar
Scientist, Engineer, Android Developer,Trainer and CEO of Softdust

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company “Softdust”, which develops products on new technologies such as Android Wear (Smart Watch and Google glass). He believes that wearable gadgets are the future of personal computing. His key skills include Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, Building Custom Linux OS and Cloud Computing. Amit is a multi talented individual and has shown his skill in diverse sectors such as non-conventional energy and Quantum physics. He has won awards in the national level from prestigious institutes like ISRO (Indian Space Research Institute of technology) and NITK (National Institute of Technology Karnataka) for the demonstration of his design of a Tidal energy power plant.

Review and Ratings