Learning Outcome:
Requirement:
Course Curriculum
Android Application Penetration Testing - Part 1
Available in
days
days
after you enroll
-
Preview
1.1 Introduction to Android
(4:25)
-
Preview
1.2 Android architecture
(7:38)
-
Preview
1.3 Software Installation
(7:06)
-
Preview
1.4 Creating an emulator
(4:24)
-
Start
2.1 Android Security Model
(6:52)
-
Start
2.2 App Sandboxing
(8:02)
-
Start
2.3 Secure Interprocess Communication
(10:17)
-
Start
2.4 Application Signing
(8:18)
-
Start
2.5 App Permissions
(7:27)
-
Start
3.1 App Structure
(6:45)
-
Start
3.2 Building a simple app
(11:31)
-
Start
4.1 Introduction
(2:53)
-
Start
4.2 M1-SharedPreferences
(7:19)
-
Start
4.3 M1-Shared Preferences
(3:40)
-
Start
4.4 M1 SQLITE
(7:43)
-
Start
4.5 M1 SQLITE
(3:27)
-
Start
4.6 Copy Paste Buffer
(7:18)
-
Start
4.7 Copy Paste Code
(1:46)
-
Start
4.8 Logging
(5:11)
-
Start
4.9 Logging Code
(2:08)
-
Start
4.10 Poor Authorization and Authentication
(3:43)
-
Start
4.11 Broken Crypto
(8:17)
-
Start
4.12 Client Side Injection-1
(3:30)
-
Start
4.13 Look at the code
(2:59)
-
Start
4-14 Client Side Injection 2
(2:19)
-
Start
4-15 A look at the code
(2:45)
-
Start
4-16 Improper Session Management
(4:07)
-
Start
4-17 Reversing intro
(2:17)
-
Start
4.18 APKTOOL
(3:39)
-
Start
4.19 dex2jar
(3:24)
-
Start
4.20 Finding Content URIs using APKTOOL
(3:21)
Android Application Penetration Testing - Part 2
Available in
days
days
after you enroll
-
Start
5.1 Setting up drozer
(5:05)
-
Start
5.2 Intent Spoofing
(8:57)
-
Start
5.3 Content Provider Leakage
(7:02)
-
Start
5.4 SQL Injection in Content Providers
(9:54)
-
Start
6.1 A look at android exploit mitigatioin techniques
(3:53)
-
Start
6.2 I m running ARM
(2:46)
-
Start
6.3 GDB setup
(6:30)
-
Start
6.4 Running a C program on your device
(6:44)
-
Start
6.5 Format String Vulnerability
(9:56)
-
Start
6.6 Transport Layer Security - SSL
(7:22)
-
Start
7.1 Overview of Android forensics Forensics
(9:32)
-
Start
7.2 SQLite data recovery
(5:26)
iOS Application Penetration Testing - Part 1
Available in
days
days
after you enroll
-
Preview
1-Course-Introduction
(6:17)
-
Preview
2-credits
(3:01)
-
Preview
3-introduction-to-ios
(4:25)
-
Preview
4-ios-app-basicsmp4
(4:03)
-
Start
5-ios-architecturemp4
(9:11)
-
Start
6-setting-up-xcode
(7:47)
-
Start
7-adding-functionality-to-helloworld-app
(10:00)
-
Start
8-Inbuilt-security-model
(9:06)
-
Start
9-SECURITY CONTROLs
(7:28)
-
Start
10-JAILBREAKING BASICS
(7:42)
-
Start
11-INSTALLATIONS
(18:24)
-
Start
12-INSTALLING CHALLANGE APPS
(7:50)
-
Start
13-IOS APP DIRECTORY STRUCTURE
(12:03)
-
Start
14-SQLITE DATA
(10:52)
-
Start
15-PLIST FILES
(6:06)
-
Start
16-NSUSER DEFAULTS
(3:42)
-
Start
17-CORE-DATA
(5:38)
-
Start
18-KEYCHAIN
(9:14)
-
Start
19-LOGGING
(4:20)
-
Preview1.1 Introduction to Android (4:25)
-
Preview1.2 Android architecture (7:38)
-
Preview1.3 Software Installation (7:06)
-
Preview1.4 Creating an emulator (4:24)
-
Start2.1 Android Security Model (6:52)
-
Start2.2 App Sandboxing (8:02)
-
Start2.3 Secure Interprocess Communication (10:17)
-
Start2.4 Application Signing (8:18)
-
Start2.5 App Permissions (7:27)
-
Start3.1 App Structure (6:45)
-
Start3.2 Building a simple app (11:31)
-
Start4.1 Introduction (2:53)
-
Start4.2 M1-SharedPreferences (7:19)
-
Start4.3 M1-Shared Preferences (3:40)
-
Start4.4 M1 SQLITE (7:43)
-
Start4.5 M1 SQLITE (3:27)
-
Start4.6 Copy Paste Buffer (7:18)
-
Start4.7 Copy Paste Code (1:46)
-
Start4.8 Logging (5:11)
-
Start4.9 Logging Code (2:08)
-
Start4.10 Poor Authorization and Authentication (3:43)
-
Start4.11 Broken Crypto (8:17)
-
Start4.12 Client Side Injection-1 (3:30)
-
Start4.13 Look at the code (2:59)
-
Start4-14 Client Side Injection 2 (2:19)
-
Start4-15 A look at the code (2:45)
-
Start4-16 Improper Session Management (4:07)
-
Start4-17 Reversing intro (2:17)
-
Start4.18 APKTOOL (3:39)
-
Start4.19 dex2jar (3:24)
-
Start4.20 Finding Content URIs using APKTOOL (3:21)
-
Start5.1 Setting up drozer (5:05)
-
Start5.2 Intent Spoofing (8:57)
-
Start5.3 Content Provider Leakage (7:02)
-
Start5.4 SQL Injection in Content Providers (9:54)
-
Start6.1 A look at android exploit mitigatioin techniques (3:53)
-
Start6.2 I m running ARM (2:46)
-
Start6.3 GDB setup (6:30)
-
Start6.4 Running a C program on your device (6:44)
-
Start6.5 Format String Vulnerability (9:56)
-
Start6.6 Transport Layer Security - SSL (7:22)
-
Start7.1 Overview of Android forensics Forensics (9:32)
-
Start7.2 SQLite data recovery (5:26)
-
Preview1-Course-Introduction (6:17)
-
Preview2-credits (3:01)
-
Preview3-introduction-to-ios (4:25)
-
Preview4-ios-app-basicsmp4 (4:03)
-
Start5-ios-architecturemp4 (9:11)
-
Start6-setting-up-xcode (7:47)
-
Start7-adding-functionality-to-helloworld-app (10:00)
-
Start8-Inbuilt-security-model (9:06)
-
Start9-SECURITY CONTROLs (7:28)
-
Start10-JAILBREAKING BASICS (7:42)
-
Start11-INSTALLATIONS (18:24)
-
Start12-INSTALLING CHALLANGE APPS (7:50)
-
Start13-IOS APP DIRECTORY STRUCTURE (12:03)
-
Start14-SQLITE DATA (10:52)
-
Start15-PLIST FILES (6:06)
-
Start16-NSUSER DEFAULTS (3:42)
-
Start17-CORE-DATA (5:38)
-
Start18-KEYCHAIN (9:14)
-
Start19-LOGGING (4:20)
Your Instructor

InSEC-Techs
InSEC-Techs (Information Security Technologies) established 2010 April, is based in Hyderabad, INDIA, fastest growing IT Security training company with strong presence in 180+ countries and 3000+ students in Online & classroom formats delivering courses like ethical hacking ,web , metasploit, iOS and android penetration testing classroom and videos courses.
InSEC-Techs have completed 5 journey of training in above said subjects and has places hundreds of students in private and public sectors.
We conduct training programs as Classroom, Online instructor led and Online self paced video learning (e-learning) formats with online school hosted on EHacking.net
Reviews

5 months ago Infosec Leader
Exceptionally proficient teacher, who will deliberately disclose everything to guarantee your complete understanding. I appreciated the challenges which were presented with the goal that I could have an opportunity to give it a shot for myself rather than continually following along.

3 months ago Jaysen Batchelor
This course was extremely overwhelming to jump into, however the instructor makes an extraordinary effort in showing step by step explaining you with the devices and strategies at an early stage.

1 months ago Milos Montes
Excellent course.... the instructor helped keep me wanting to continue through all the lectures.

1 months ago Alexey Brenes
This was till now the best course I have had on EH Academy. The instructor does a great job! He teaches with great interest and has a rich educational knowledge.

6 months ago Anthony Falcon
This course is really engaging and the instructor was well prepared to deliver the content effectively.

9 months ago Benjamin Major
The instructor has a strong grasp of the subject and makes the learning fun with his antics. Have enjoyed all of this instructor’s courses.

8 months ago Chad Blair
I really liked this course because the instructor uses very basic but clear models to demonstrate a concept. It really helped me get a picture of what's happening throughout the course.

4 months ago Chris Dunavan
For me this was quite quick, but deep enough, course to get detailed knowledge. This class was very well organized and delivered, I enjoyed it.

3 months ago Cristian Drincu
Excellent!! I would recommend as "A Must" for students who are seeking quality course.

2 months ago Edwin-Torres-Sanchez
This is really good, building from beginner to amateur, so far - I've taken a lot from this course and actually am using the things I learn on a daily basis in my work.

6 months ago Glen Ihrig
The course is really engaging and an experiential learning.

7 months ago Hector-Toledo
Almost done with the course. Excellent all round. The course is well structured and the pace is just correct.

1 months ago Hector-Toledo
The instructor explains clearly each point, and he is concise and to the point. He uses practical and visual approach that makes concepts easy to understand and hard to forget.

2 months ago Juan John Charles
Very engaging presentation and manages to condense a lot of information into short periods but still makes it all understandable.

1 months ago Marcus Smith