This Course suitable for :
Penetration testers
Ethical hackers
Auditors who need to build deeper technical skills
Security personnel whose job involves assessing, deploying or securing mobile phones and tablets
Network and system administrators supporting mobile phones and tablets
GMOB Certification Exam
Mobile Device Security Analyst
Course content :
Section 1 - Device Architecture and Common Mobile Threats
1.1 Introduction Securing Mobile Environments
1.2 Mobile Problems and Opportunities
1.3 What You Need to Know About iOS
1.4 What You Need to Know About Android
1.5 What You Need to Know About Wearable Devices
1.6 Building Your Lab
1.7 Mitigating Mobile Malware
1.8 Mitigating the Stolen Device Threat
Section 2 Mobile Platform Access and Application Analysis
2.1 Unlocking, Rooting, and Jailbreaking
2.2 Data Storage and Filesystems
2.3 Network Activity Analysis
Section 3 Mobile Application Reverse Engineering
3.1 Automating App Analysis
3.2 Reverse Engineering Obfuscated Applications
3.4 App Report Cards
Section 4 Penetration Testing Mobile Devices, Part 1
4.1 Mobile Penetration Testing
4.2 Leveraging Mobile Malware
4.3 Wireless Network Scanning
4.4 Mapping Client Network Probe Activity
4.5 Open Network Attacks
4.6 Weak Network Infrastructure Attacks
4.7 Enterprise Wireless Attacks
4.8 Pen Test Conclusion Part 1
Section 5 Penetration Testing Mobile Devices, Part 2
5.1 Network Manipulation Attacks
5.2 Sidejacking Attacks
5.3 SSL-TLS Attacks
5.4 Network Traffic Manipulation
5.5 Client Side Injection Attacks
5.6 Web Application Attacks
5.7 HTTP Parameter Tampering
5.8 SQL Injection Attacks
5.9 Where To Go From Here
Section 6 Capture the Flag
6.1 Securing Mobile Environments Final Workshop
Bonus :
Bug Bounty Android Hacking Course
No comments:
Post a Comment