Cart
Sign In

Sorry! ONLINE DELIVERY VIA EMAIL - Expert Training Mobile Device Security and Ethical Hacking SEC575 Video Training Course Download Downloadable Content is sold out.

Compare Products
Clear All
Let's Compare!

ONLINE DELIVERY VIA EMAIL - Expert Training Mobile Device Security and Ethical Hacking SEC575 Video Training Course Download Downloadable Content

This product has been sold out

We will let you know when in stock
notify me

Featured

Highlights

  • Disclaimer:Online Delivery via E-mail. No Physical Dispatch. Non-Cancellable Product
  • Stream:Ethical Hacking
  • Certification:No
  • Language:English
  • Format:Downloadable Content
  • Type:Online Fulfillment
  • For queries and concerns drop an email to learning@snapdeal.com
  • SUPC: SDL591759397

Description

Mobile Device Security and Ethical Hacking Video Training Course Download



This course for



Penetration testers

Ethical hackers

Auditors who need to build deeper technical skills

Security personnel whose job involves assessing, deploying or securing mobile phones and tablets

Network and system administrators supporting mobile phones and tablets

GMOB Certification Exam



Mobile Device Security Analyst



Course content :



Section 1 - Device Architecture and Common Mobile Threats

1.1 Introduction Securing Mobile Environments

1.2 Mobile Problems and Opportunities

1.3 What You Need to Know About iOS

1.4 What You Need to Know About Android

1.5 What You Need to Know About Wearable Devices

1.6 Building Your Lab

1.7 Mitigating Mobile Malware

1.8 Mitigating the Stolen Device Threat



Section 2 Mobile Platform Access and Application Analysis

2.1 Unlocking, Rooting, and Jailbreaking

2.2 Data Storage and Filesystems

2.3 Network Activity Analysis



Section 3 Mobile Application Reverse Engineering

3.1 Automating App Analysis

3.2 Reverse Engineering Obfuscated Applications

3.4 App Report Cards



Section 4 Penetration Testing Mobile Devices, Part 1

4.1 Mobile Penetration Testing

4.2 Leveraging Mobile Malware

4.3 Wireless Network Scanning

4.4 Mapping Client Network Probe Activity

4.5 Open Network Attacks

4.6 Weak Network Infrastructure Attacks

4.7 Enterprise Wireless Attacks

4.8 Pen Test Conclusion Part 1



Section 5 Penetration Testing Mobile Devices, Part 2

5.1 Network Manipulation Attacks

5.2 Sidejacking Attacks

5.3 SSL-TLS Attacks

5.4 Network Traffic Manipulation

5.5 Client Side Injection Attacks

5.6 Web Application Attacks

5.7 HTTP Parameter Tampering

5.8 SQL Injection Attacks

5.9 Where To Go From Here



Section 6 Capture the Flag

6.1 Securing Mobile Environments Final Workshop



Bonus :



Bug Bounty Android Hacking Course & Guides PDF

Terms & Conditions

The images represent actual product though color of the image and product may slightly differ.