Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Android Application Penetraion Testing Course: Android Application Penetration Testing is a division of PENETRATION TESTING Domain that concentrates on PenTesting
Android applications on Android devices like mobiles and tablets. This course is intended students/professionals who are intended to make career in mobile penetration testing domain. The course covers in and out of , actually Hacking (Penetration)
Android Apps and INSEC-TECHS have developed vulnerable
Android Apps for students to practice Labs. INSEC-TECHS will share 14 such applications to learn Hacking Android Mobile Applications with crack challenges. Both InSEC-Techs iOS and Android Application Penetration Testing course is a highly practical and hands on video course. This course focuses on beginners as well as advanced users. Instructor has created all the required vulnerable applications in order for you to practice all the hands-on exercises demonstrated in this course in a legal environment. This course begins with very basics keeping beginners in mind. Even if you have worked on some Android app security assessments, there will be something new for you. After completing this course, you will learn where to start iOS app penetration testing, Pentesting iOS Apps, Network monitoring on iDevices and finally some automated tools to complete the task. It contains more than 14 challenges to crack. Instructor explains all the solutions when and where it is required.
The course is designed as a complete guide to understand and practice Android Mobile app hacking efficiently in real time. This is online certification Course by InSEC-Techs and your doubts related to the subject are solved for ever on discussion board. We provide you material and references to get more understanding and learning this tool. The course is very well structured, explaining the terminologies , functionality and lab practicals are very well shown as feeding baby a banana.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction to Android|
Creating an EmulatorPreview
|Section 2: Android Security Model|
Android Security Model Basics
Secure interprocess communication
|Section 3: App Development Basics|
Understanding Android App Structure
Building a simple App
|Section 4: Seurity Auditing of Android Apps : OWASP top 10|
M2:Insecure Data Storage: Shared Preferences
M2:Insecure Data Storage: Shared Preferences: Look at Code
M2 Insecure Data Storage: SQLITE Database
M2: SQLITE Data Storage: Look at code
M3 – Insufficient Transport layer protection / Intro & HTTP traffic interception
M3 – Insufficient Transport layer protection --- Intercepting HTTPS traffic
M3 – Insufficient Transport layer protection --- The Coffee shop attack
M3 Insufficient Transport ../ Passive analysis with tcpdump & Wireshark
M4 – Unintended Data Leakage -- Reading the clipboard
M4 – Unintended Data Leakage -- Reading the clipboard - Look at Code
M4 – Unintended Data Leakage --Logging
M4 – Unintended Data Leakage --Logging -- Look at Code
M5: Poor Authentication and Authorization
M6: Broken Cryptography
M7 – Client Side Attack-- SQL Injection at Client Side
M7 - SQL INJECTION -- LOOK AT CODE
M7 - frame injection in webviews
M7 - frame injection in webviews -- Look at Code
M8 – Security Decisions via untrusted inputs -- Intent Spoofing
M9 – Improper Session Handling
M10 – Lack of binary protection -- Introduction
M10 - Reversing android apps with APKTOOL
M10 - Reversing android apps with dex2jar & JD-GUI
M10 - Finding Content Provider URIs using APKTOOL.
|Section 5: Automated security assessments with Drozer|
Setting up Drozer
Exploiting content provider leakage
SQL Injection in content provider
|Section 6: Native Exploitation|
Android exploitation mitigation techniques
ARM - Advanced Risc Machines
Setting up GDB for debugging
Running a C programe on android device.
Format string vulnerabilities in ARM
|Section 7: Android Forensics|
SQLite data recovery
|Section 8: Materials|
InSEC-Techs (Information Security Technologies) www insectechs dot in is an integrated single-source IT training company providing classroom and distance courses like PHP, Ethical Hacking, Web Application Penetration Testing, Python, C language, Perl, CCNA and web development firm with uniquely competent, professional and creative website designing & internet marketing company providing full featured internet marketing solutions and web services including B2B & B2C e-commerce solutions which also acts as an offshore development center for overseas development firms to help them optimize their business significance in the global market- With one phone call you get a team of highly-skilled experts with a business-driven common-sense approach-
InSEC-Techs ensure that individual care is taken in classroom while conducting sessions- We will not have more than seven students per batch in a single session to shoot more concentration on each student-
Kiran Thirukovela, 31 years old Cyber-techie and Cheif Executive Officer (CEO) of InSEC-Techs (Information Security Technologies)
Dropped out B-Techs (ECE) by choice and B-SC (Computer Science)and stepped into the world of Computers and networking- Kiran holds IT certification like
MCSA: Microsoft Certified System Administrator
CCNA: Cisco Certified Network Administrator
IINS: Implementing IOS Network Security Expert
CCNP: Cisco Certified Network Professional
CCNP-Sec: Cisco Certified Network Professional Security
CCSP: Cisco Certified SecurityProfessional
AFCEH: Ankit Fadia Certified Ethical Hacker
CHFI: Computer Hacking Forensic Investigator
Kiran has authored book "Cyber Crimes Investigation" with co-author Mr- Benild Joseph- A Book written for law enforcement agencies in india- Kiran is Network Security professional with 5+ years of experience and 3+ years of as Ethical Hacking trainer-
He specializes in Web Application security, Penetration testing and Forensic investigation and solved cyber crime cases in India and kenya-
Nipun is well-known IT security Researcher, Well Known for his activities in the field of ethical hacking and cyber forensics - Mr- Nipun was an Independent security expert , who works on cyber crime cases and investigations , he was the Ex-C-T-O in Secugenius Security Solutions , Also He Worked As A Security Analyst in a Company - During His Career He has Pen-tested over 100+ Servers And Solved Many Cyber Crime Cases ,
He Has Trained Over 5000+ students in the field of ethical hacking and penetration testing , he is the currently the ambassador for EC-COUNCIL Programs In Lovely Professional University (First Indian University To Tie Up With EC-COUNCIL)- He is Currently Pursuing Masters In Technology (M-TECH) From LPU Itself - He Has Been The Speaker At Several National Level Confrences - His Security Research Papers Are Published Over Many Sites Like Packetstorm, SourceForge Etc-
Achievements of His Careers:
a- Certified Ethical Hacker (EC-COUNCIL C|EH)
b- Certified Information Security Expert (CISE)
c- Ankit Fadia's Certified Ethical Hacker (AFCEH 5-0)
d- Winner Of Innobuzz Best Blog Competition (2010)
e- Ambassador Of EC-COUNCIL @ Lovely Professional University
f- Ex- Chief Technical Officer At Secugenius Security Solutions
g- Ex- Security Analyst At Cyber Cure Solutions Delhi
h- Founder/Admin Of Starthack.
i- Founder/Admin Of Indian Cyber Police (Among Most Active HAcker's group of india)
j- Administrator of various Forum
k- Admin Of Hacker's Group Ap3x_nd_h4ck0
l- Respected V-I-P Member Of International Hacker's Forum (MADLEETS Pakistan)
m- Presenter At HATCON LPU & HATCON KANPUR
n- Presenter At DEFCON Groups (DC141001)
1-Defcon Rajasthan :
2- Defcon Punjab :
o- Presently writing two books On Web application Hacking And Metasploit Framework
p- Trained Over 5000 Students And Delivered Over 50+ Workshops
q- Worked On Cyber Crime Cases-
r- Secured Over 1000 Domains
s- Regular Author At Packet Storm Security.
Bio: Mr- Srinivas
Mr- Srininvas is Security Analyst and Ethical Hacking Trainer Since 6 Years and addressed over 50 workshops and Seminars- He is Co-Author of the Book "Hacking S3crets", along with Sai Satish and Aditya Gupta-
Srininvas is also moderator of famous Hacking Forum based website andhrahackers and contributed SQL Injection articles to World's leading hacking magazine "hackin9"-
Srininvas was honoured with "PRATHIBHA" Award by Govt- of Andhra Pradesh in Year 2008-