Чему вы научились?
You will understand the different types of vulnerabilities that affect mobile applications and have the practical knowledge to attack and exploit them.
Perform real world attacks on Android Devices and Apps.
By the end of the course , You will learn How to Fuzz mobile apps.
OWASP Top Ten Mobile and Web most common vulnerabilities.
Build your own home lab on mobile application security.
By the end of the course , You will learn Mobile applications reverse engineering.
Practice on real world mobile applications.
Provides you the skills necessary to peform Penetration tests of mobile applications.
О курсе
This course includes all necessary information to start your carrier in Cyber Security field. This course aims to teach you how to perform full penetration testing on Android Mobile applications.
Course at a glance:
- Start from Android architectures basics.
- Covers Mobile applications reverse engineering.
- Practice on real world mobile applications.
- Build your own home lab on mobile application security.
- Provides you the skills necessary to perform Penetration tests of mobile applications.
Syllabus:
- Introduction To Mobile Apps.
- Mobile Application Security.
- Mobile Application Penetration Testing.
- The most common areas where we find mobile application data resides.
- The Architecture of Android.
- The App Sandbox and the Permission Model.
- AndroidManifest.xml File.
- Android Compilation Process.
- Android Startup Process.
- Android Application Components.
- Setup a testing environment.
- Android Debug Bridge (adb).
- Digging deeper into Android (ADB tool).
- intercept and analyze the network traffic.
- Reversing an Android application.
- OWASP top 10 vulnerabilities for mobiles.
- Install DIVA (Damn insecure and vulnerable App).
- Insecure Logging Issue.
- Insecure Data Storage.
- Database Insecure Storage.
- Insecure Data Storage Inside Temporary Files.
- Hardcoding Issues.
- Input Validation Issues - SQL Injection.
- Input Validation Issues - Exploiting Webview Vulnerability.
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 10 hours.
NOTE: This course is created for educational purposes only.
Требования
- Basic knowledge of programming fundamentals.
- A desire to learn.
Лекторы

Eslam Medhat (Ethical Hacking, Bug Bounty and Penetration Testing)
Hacking, Ethical Hacking, Bug Bounty and Penetration Testing
Платформа
Курсы Udemy подойдут для профессионального развития. Платформа устроена таким образом, что эксперты сами запускают курсы. Все материалы передаются в пожизненный доступ. На этой платформе можно найти курс, без преувеличений, на любую тему – начиная от тьюториала по какой-то камере и заканчивая теоретическим курсом по управлению финансовыми рисками. Язык и формат обучения устанавливается преподавателем, поэтому стоит внимательно изучить информацию о курсе перед покупкой.
Рейтинг
4.0
(84)
(56)
(33)
(5)
(9)
Комментарии (187)