Cart
Sign In

Sorry! Easy Learning Mobile Device Security and Ethical Hacking Video Training Course on 3 DVDs DVD is sold out.

Compare Products
Clear All
Let's Compare!

Easy Learning Mobile Device Security and Ethical Hacking Video Training Course on 3 DVDs DVD

This product has been sold out
(4.0) 2 Ratings Have a question?

We will let you know when in stock
notify me

Featured

Highlights

  • Disclaimer:Normal Physical Delivery of Product
  • Stream:Ethical Hacking
  • Certification:No
  • Language:English
  • Format:DVD
  • Type:Physical Shipping
  • SUPC: SDL671618209

Description

This Course suitable for : Penetration testers Ethical hackers Auditors who need to build deeper technical skills Security personnel whose job involves assessing, deploying or securing mobile phones and tablets Network and system administrators supporting mobile phones and tablets GMOB Certification Exam Mobile Device Security Analyst Course content : Section 1 - Device Architecture and Common Mobile Threats 1.1 Introduction Securing Mobile Environments 1.2 Mobile Problems and Opportunities 1.3 What You Need to Know About iOS 1.4 What You Need to Know About Android 1.5 What You Need to Know About Wearable Devices 1.6 Building Your Lab 1.7 Mitigating Mobile Malware 1.8 Mitigating the Stolen Device Threat Section 2 Mobile Platform Access and Application Analysis 2.1 Unlocking, Rooting, and Jailbreaking 2.2 Data Storage and Filesystems 2.3 Network Activity Analysis Section 3 Mobile Application Reverse Engineering 3.1 Automating App Analysis 3.2 Reverse Engineering Obfuscated Applications 3.4 App Report Cards Section 4 Penetration Testing Mobile Devices, Part 1 4.1 Mobile Penetration Testing 4.2 Leveraging Mobile Malware 4.3 Wireless Network Scanning 4.4 Mapping Client Network Probe Activity 4.5 Open Network Attacks 4.6 Weak Network Infrastructure Attacks 4.7 Enterprise Wireless Attacks 4.8 Pen Test Conclusion Part 1 Section 5 Penetration Testing Mobile Devices, Part 2 5.1 Network Manipulation Attacks 5.2 Sidejacking Attacks 5.3 SSL-TLS Attacks 5.4 Network Traffic Manipulation 5.5 Client Side Injection Attacks 5.6 Web Application Attacks 5.7 HTTP Parameter Tampering 5.8 SQL Injection Attacks 5.9 Where To Go From Here Section 6 Capture the Flag 6.1 Securing Mobile Environments Final Workshop Bonus : Bug Bounty Android Hacking Course

Terms & Conditions

The images represent actual product though color of the image and product may slightly differ.