This course will help you work with mobile application penetration testing. Mobile applications are becoming integral part of our life, This evolution has created a new range of attacks that are not relevant in the classic web applications. Mobile application vulnerabilities leads to more sophisticated attacks which can’t be blocked with authentic security techniques.
By the end of the program, participants will be able to do:
- Use jailbreak tools for Apple iOS and Android systems
- Conduct an analysis of iOS and Android filesystem data to plunder compromised devices and extract sensitive mobile device use information
- Analyze Apple iOS and Android applications with reverse-engineering tools
- Change the functionality of Android and iOS apps to defeat anti-jailbreaking or circumvent in-app purchase requirements
- Conduct an automated security assessment of mobile applications
- Use wireless network analysis tools to identify and exploit wireless networks used by mobile devices
- Intercept and manipulate mobile device network activity
- Leverage mobile-device-specific exploit frameworks to gain unauthorized access to target devices
- Manipulate the behavior of mobile applications to bypass security restrictions
Android penetration testing course content:
- Mobile Device Architecture and common mobile threats
- Android Architecture
- Introduction to Mobile Security
- Threats on rooted and non-rooted mobile phones
- Mobile Device File System
- Fingerprinting Mobile Devices
- Network activity Monitoring
- Reverse Engineering and Static Application Analysis
- Manipulating Application Behaviour
- Best practices and security guidelines for the mobile applications.
IOS Penetration testing course content:
- Introduction to iOS Security
- Creating an Application Pentest Platform
- Advanced Application Runtime Analysis
- Exploiting iOS Applications
- IOS Forensics and Data Recovery
- IOS Malware and Backdoors
Wrapping Up Words from the Wise
- Review of Parking Lot
- Lessons Learned
- Completion of Action Plans and Evaluations
Who Should Attend?
- Security officers
- Security professionals
- Mobile application Developers
- Individuals concerned about mobile application security
- All our courses can be facilitated as Customized In-House Training course.
- Course duration is flexible and the contents can be modified to fit any number of days.
- As for Open Enrolment Courses, we offer our clients the flexibility to choose the location, date, and time and our team of experts who are spread around the globe will assist in facilitating the course.
- The course fee includes facilitation, training materials, 2 coffee breaks, buffet lunch and a Certificate of successful completion of Training.
- FREE Consultation and Coaching provided during and after the course.