/TBEHC | Termux Beginner Ethical Hacking Course

TBEHC | Termux Beginner Ethical Hacking Course


65 modules


Certificate of completion

Lifetime access

Become a skilled Termux user with your Android phone


The TBEHC (Termux Beginner Ethical Hacking Course) is a comprehensive course designed to equip individuals with the necessary skills and knowledge to embark on a journey into the world of arch linux using Termux. Termux is a powerful terminal emulator and Linux environment that runs on Android devices, allowing users to learn and experince Linux system on andriod. This course is specially tailored for beginners who want to explore the field of cybersecurity and learn the basics.

Throughout the course, you will learn the fundamentals of cyber security including understanding different concepts, bash programming, Linux CLI Commads, cryptography, web Devlopment using Termux, reconnaissance, scanning, enumeration, vulnerability assessment, and Daily Use of Termux. You will also explore various tools and techniques used by ethical hackers to secure computer systems.

The course begins with an introduction to Cyber Security and its importance in today's digital world. You will then dive into the setup and configuration of Termux on your Android device. Next, you will learn the basics of Linux command line operations, essential for cyber security. As the course progresses, you will explore various topics such as information gathering, network scanning, and vulnerability assessment. You will gain hands-on experience through practical exercises, where you will learn to perform network attacks, and exploit system vulnerabilities on your own local area network.

This course emphasis on the importance of ethical behavior and legal implications of Linux. You will understand how to stay within legal boundaries and use your skills responsibly to protect systems, detect vulnerabilities, and assist in securing digital assets. By the end of this course, you will have a solid understanding of arch linux using Termux and be well-prepared to pursue further advanced studies or even begin a career in cybersecurity.

Key Highlights

Introduction to Arch Linux

Understanding the Basics of Termux and Linux

Exploring common linux tools and environment

Learning various types of attacks and their preverntions

Practicing penetration testing on virtual environments

Securing personal data and staying safe online

Developing a hacker mindset and problem-solving approach

Gaining hands-on experience through practical in safe virtual environments

What you will learn

Learn the fundamentals

Acquire a solid foundation in cyber security concepts, tools, and techniques.

Master the use of Termux

Gain hands-on experience in using Termux, a powerful Android application for linux users

Perform on your LAN

Apply your knowledge and skills to simulate real-world situations and learn practical techniques on your own Local Network.

Exploit vulnerabilities and secure systems

Discover vulnerabilities in computer systems and networks, and learn how to protect them from potential threats


0.1 TBEHC Course Intro

2 attachments • 1 mins


What is Termux?




1.1 Installing Termux

2 attachments • 4 mins


Download Termux

Why playstore version of termux is not working?

1.2 Setting Up Termux

2.1 TBS basic navigation in CLI

1 attachment

Termux Basic Commands pdf

6 pages

2.2 File Manipulation

2.3 Termux pkg

2.4 Text Editor

2.5 GitHub

1 attachment • 1 mins


2.6 wget Download Files

1 attachment • 1 mins

Few links for practice

2.7 Termux System Commands

2.8 Networking Commands

2.9 GUI Hacks

3.1 Termux Fun Commands

1 attachment

Termux Fun Tools you can explore

3.2 Termux Autocorrect Shell

1 attachment

Termux Fish Shell

3.3 Customizing bashrc file

3.4 Termux alias

3.5 Termux Neofetch

3.6 Termux Emoji Prompt

1 attachment

Termux Emoji Prompt

4.1 What is phishing and How to Prevent it


4.2 How hacker find phishing tools?

4.3 Demo phishing practical

5.1 What is DOS attack and how to prevent it

5.2 DOS attack practical using Termux

6.1 Intro to Bash Scripting


6.2 Echo and Read

1 attachment • 1 mins


6.3 Making a Calculator

1 attachment • 1 mins


6.4 Conditional Execution of Code

1 attachment • 1 mins


6.5 Grades Calculator

1 attachment • 1 mins


6.6 Loops in Bash

2 attachments • 2 mins



6.7 Things you need to know

1 attachment • 1 mins


7.1 Social Engineering


7.2 Social Engineering Practical

7.3 Example of social engineering attack - Mr Robot

8.1 Footprinting and Information Gathering

8.2 Log IP Address

1 attachment

Install ShellPhish Tool

8.3 Track IP

1 attachment

Install Track-ip

8.4 Instagram InfoGA

1 attachment

Install Instagram InfoGa

8.5 Website Information Gathering

1 attachment

Install RedHawk

8.6 CamDumper

1 attachment

Install CamDumper Tool

8.7 A Fun Reel on Google Dorking

1 attachment • 2 mins

Google Dorking Cheet sheet

9.1 MetaSploit Intro

1 attachment • 1 mins

Official Metasploit Website

9.2 Install Metasploit In Termux

1 attachment

Install Metasploit

9.3 Generate a payload with Metasploit

2 attachments • 2 mins

Ngrok official site link

Generate a payload

9.4 Msf6 practical

1 attachment • 1 mins

Exploit The Payload.txt

10.1 Encryption And Decryption with Termux

10.2 Encryption and Decryption Practicals

10.3 Changing Colors and Fonts in Termux

1 attachment

Install Termux-Style Tool

10.4 Advance theme changing

1 attachment

Install My Termux Theme

11.1 Email Bypass

1 attachment • 1 mins

TempMail site link

11.2 OTP Bypass Phishing

1 attachment

Clifty Tool incase you need it

11.3 Proxy Sites

1 attachment • 1 mins

The proxy site that i have used in the Video

11.4 Tor Browser

1 attachment • 1 mins


Tor Browser download link

12 Location Tracing

1 attachment

Install the Seeker tool

13.1 Termux WebDev Intro

13.2 Installing the WebServer

13.3 Coding in HTML

1 attachment • 1 mins

My Porfolio Code

13.4 Making the Website Live

13.5 Professional Looking site

1 attachment

Site Where you can get the free HTML Themes

14.1 Termux Daily Use

14.2 Download Youtube Videos with Termux

1 attachment


Termux-YTD 2.0

14.3 Termux-Torrent

1 attachment

Termux-Torrent tool

14.4 SSH in Termux

2 attachments

SSH Commands

If you don't have SSH in your PC use this method to enable it

14.5 Chat in Termux

15.1 How to avoid getting Hacked?

15.2 Final Words


When you complete this course you receive a ‘Certificate of Completion’ signed and addressed personally by me.

Course Certificate


How can I enrol in a course?

Enrolling in a course is simple! Just browse through our website, select the course you're interested in, and click on the "Enrol Now" button. Follow the prompts to complete the enrolment process, and you'll gain immediate access to the course materials.

Can I access the course materials on any device?

Yes, our platform is designed to be accessible on various devices, including computers, laptops, tablets, and smartphones. You can access the course materials anytime, anywhere, as long as you have an internet connection.

How can I access the course materials?

Once you enrol in a course, you will gain access to a dedicated online learning platform. All course materials, including video lessons, lecture notes, and supplementary resources, can be accessed conveniently through the platform at any time.

Can I interact with the instructor during the course?

Absolutely! we are committed to providing an engaging and interactive learning experience. You will have opportunities to interact with them through our community. Take full advantage to enhance your understanding and gain insights directly from the expert.

About the creator

About the creator


Hey there! I'm SaadMaqsood. You've probably seen me on Learntermux.tech or caught some of my content on YouTube as SaadMaqsood. With a background in Computer Engineering and a flair for content creation 🎥, I'm on a mission to demystify Linux on Android devices. Through my content, I empower individuals with the knowlage of cyber security, ensuring they're equipped to navigate the digital landscape securely. 🛡 Join the community and as always, Stay Ethical.

Rate this Course

$ 7.00



Order ID:

This course is in your library

What are you waiting for? It’s time to start learning!

Illustration | Payment success

Share this course




Wait up!

We see you’re already enrolled in this course till Lifetime. Do you still wish to enroll again?

Illustration | Already enrolled in course