Course Description
We are going to start from scratch in this course and aim to learn all the details related to Ethical Hacking for Mobile Applications & Mobile Devices. Without any need for prior knowledge, you will understand how hackers attack mobile applications & devices and protect yourself against these attacks. You will build your own hacking lab on your computer so that you can practice all the things that we are going to learn in this course.
This course is ideal for students who are willing to learn mobile device and mobile application penetration testing and ethical hacking. Whether you are a professional developer or just a beginner it does not matter. We are going to start from scratch and aim to learn all the details. At the end of the course, you will be able to understand the vulnerabilities in the real-world and learn how to fix them.
Throughout the course, we are not going to focus on pure theory. We are going to practice everything we learn with special apps and challenges specifically created for this course only! We are going to have a real-time hacking exercise.
Program Objectives
- Lab Setup
- Mobile Backdoors
- Android Studio Fundamentals
- Java Fundamentals
- iOS Development Fundamentals
- Rooting and Jailbreaking
- Reverse Engineering: Android
- Reverse Engineering: iOS
- Cloud Hacking: Firebase Security
- Banking App Hacking
- In-network Attacks for Mobile Devices
Upon completion of the mobile ethical hacking course you will able to:
- Communicate mobile device security threats and the risks
- Describe mobile applications and device Security functions
- Discover mobile hacking techniques (Android and iOS)
- List platform and device security models
- List pitfalls to mobile device security
- Perform attacks against sample mobile apps to understand the weaknesses that exist in the current device security models
- Perform mobile app, file system, and runtime analysis
- Assess mobile app and device security
- Implement secure coding techniques into your mobile development lifecycle
- Protect your mobile apps from high-risk attacks
- Identify business logic and technical vulnerabilities in your mobile applications
- Capture the business logic flow of the mobile application
- Secure mobile applications from technical and business logic perspectives
- Understand real-world attack techniques
- Identify the application’s vulnerabilities that can be exploited using installed applications on mobile devices
- Assess mobile device security issues
- Test and discover vulnerabilities present in mobile devices, applications, servers, and the networks
Course Features
- Lectures 0
- Quizzes 0
- Videos Duration 40 hours
- Skill level All levels
- Language English
- Students 438
- Certificate No
- Assessments Yes