Search This Blog

Saturday, February 2, 2019

Mobile Device Security and Ethical Hacking Video Training Course on 3 DVDs



This Course suitable for :

Penetration testers
Ethical hackers
Auditors who need to build deeper technical skills
Security personnel whose job involves assessing, deploying or securing mobile phones and tablets
Network and system administrators supporting mobile phones and tablets
GMOB Certification Exam

Mobile Device Security Analyst

Course content :

Section 1 - Device Architecture and Common Mobile Threats
1.1 Introduction Securing Mobile Environments
1.2 Mobile Problems and Opportunities
1.3 What You Need to Know About iOS
1.4 What You Need to Know About Android
1.5 What You Need to Know About Wearable Devices
1.6 Building Your Lab
1.7 Mitigating Mobile Malware
1.8 Mitigating the Stolen Device Threat

Section 2 Mobile Platform Access and Application Analysis
2.1 Unlocking, Rooting, and Jailbreaking
2.2 Data Storage and Filesystems
2.3 Network Activity Analysis

Section 3 Mobile Application Reverse Engineering
3.1 Automating App Analysis
3.2 Reverse Engineering Obfuscated Applications
3.4 App Report Cards

Section 4 Penetration Testing Mobile Devices, Part 1
4.1 Mobile Penetration Testing
4.2 Leveraging Mobile Malware
4.3 Wireless Network Scanning
4.4 Mapping Client Network Probe Activity
4.5 Open Network Attacks
4.6 Weak Network Infrastructure Attacks
4.7 Enterprise Wireless Attacks
4.8 Pen Test Conclusion Part 1

Section 5 Penetration Testing Mobile Devices, Part 2
5.1 Network Manipulation Attacks
5.2 Sidejacking Attacks
5.3 SSL-TLS Attacks
5.4 Network Traffic Manipulation
5.5 Client Side Injection Attacks
5.6 Web Application Attacks
5.7 HTTP Parameter Tampering
5.8 SQL Injection Attacks
5.9 Where To Go From Here

Section 6 Capture the Flag
6.1 Securing Mobile Environments Final Workshop

Bonus : 

Bug Bounty Android Hacking Course

Buy This Course DVD Now @







                                 






No comments:

Post a Comment