Learning Outcome:
Requirement:
Course Curriculum
Mobile Application Pentesting
Available in
days
days
after you enroll
-
Start
01) Mobile devices theory
(37:16)
-
Start
02) Mobile hacking theory
(23:30)
-
Start
03) Android Hacking tools
(40:11)
-
Start
04) Hacking mobile devices engagement
(6:03)
-
Start
05) IOS security controls theory
(30:33)
-
Start
06) Android security controls theory
(22:07)
-
Start
07) How to protect your Android smartphone
(17:31)
-
Start
08) How to install Android emulator
(17:48)
-
Start
09) Android emulators
(14:31)
-
Start
10) How to install android as a virtual machine
(24:15)
-
Start
11) Hacking Android devices with metasploit
(37:27)
-
Start
12) Metasploit Android
(14:37)
-
Start
13) Becoming persistent in Android system
(17:09)
Mobile Application Pentesting
Available in
days
days
after you enroll
-
Start01) Mobile devices theory (37:16)
-
Start02) Mobile hacking theory (23:30)
-
Start03) Android Hacking tools (40:11)
-
Start04) Hacking mobile devices engagement (6:03)
-
Start05) IOS security controls theory (30:33)
-
Start06) Android security controls theory (22:07)
-
Start07) How to protect your Android smartphone (17:31)
-
Start08) How to install Android emulator (17:48)
-
Start09) Android emulators (14:31)
-
Start10) How to install android as a virtual machine (24:15)
-
Start11) Hacking Android devices with metasploit (37:27)
-
Start12) Metasploit Android (14:37)
-
Start13) Becoming persistent in Android system (17:09)
Your Instructor
CIP Cyber
CIP Cyber is an initiative dedicated to protecting critical infrastructure from
cyber threats. Our vision is to empower the cybersecurity community to
defend critical infrastructure, and our mission is to connect, train, and certify
people to protect critical infrastructure.