Learning Outcome:
Requirement:
Course Curriculum
Android Application Penetration Testing - Part 1
Available in
days
days
after you enroll
-
Preview
1.1 Introduction to Android
(4:25)
-
Preview
1.2 Android architecture
(7:38)
-
Preview
1.3 Software Installation
(7:06)
-
Preview
1.4 Creating an emulator
(4:24)
-
Start
2.1 Android Security Model
(6:52)
-
Start
2.2 App Sandboxing
(8:02)
-
Start
2.3 Secure Interprocess Communication
(10:17)
-
Start
2.4 Application Signing
(8:18)
-
Start
2.5 App Permissions
(7:27)
-
Start
3.1 App Structure
(6:45)
-
Start
3.2 Building a simple app
(11:31)
-
Start
4.1 Introduction
(2:53)
-
Start
4.2 M1-SharedPreferences
(7:19)
-
Start
4.3 M1-Shared Preferences
(3:40)
-
Start
4.4 M1 SQLITE
(7:43)
-
Start
4.5 M1 SQLITE
(3:27)
-
Start
4.6 Copy Paste Buffer
(7:18)
-
Start
4.7 Copy Paste Code
(1:46)
-
Start
4.8 Logging
(5:11)
-
Start
4.9 Logging Code
(2:08)
-
Start
4.10 Poor Authorization and Authentication
(3:43)
-
Start
4.11 Broken Crypto
(8:17)
-
Start
4.12 Client Side Injection-1
(3:30)
-
Start
4.13 Look at the code
(2:59)
-
Start
4-14 Client Side Injection 2
(2:19)
-
Start
4-15 A look at the code
(2:45)
-
Start
4-16 Improper Session Management
(4:07)
-
Start
4-17 Reversing intro
(2:17)
-
Start
4.18 APKTOOL
(3:39)
-
Start
4.19 dex2jar
(3:24)
-
Start
4.20 Finding Content URIs using APKTOOL
(3:21)
Android Application Penetration Testing - Part 2
Available in
days
days
after you enroll
-
Start
5.1 Setting up drozer
(5:05)
-
Start
5.2 Intent Spoofing
(8:57)
-
Start
5.3 Content Provider Leakage
(7:02)
-
Start
5.4 SQL Injection in Content Providers
(9:54)
-
Start
6.1 A look at android exploit mitigatioin techniques
(3:53)
-
Start
6.2 I m running ARM
(2:46)
-
Start
6.3 GDB setup
(6:30)
-
Start
6.4 Running a C program on your device
(6:44)
-
Start
6.5 Format String Vulnerability
(9:56)
-
Start
6.6 Transport Layer Security - SSL
(7:22)
-
Start
7.1 Overview of Android forensics Forensics
(9:32)
-
Start
7.2 SQLite data recovery
(5:26)
iOS Application Penetration Testing - Part 1
Available in
days
days
after you enroll
-
Preview
1-Course-Introduction
(6:17)
-
Preview
2-credits
(3:01)
-
Preview
3-introduction-to-ios
(4:25)
-
Preview
4-ios-app-basicsmp4
(4:03)
-
Start
5-ios-architecturemp4
(9:11)
-
Start
6-setting-up-xcode
(7:47)
-
Start
7-adding-functionality-to-helloworld-app
(10:00)
-
Start
8-Inbuilt-security-model
(9:06)
-
Start
9-SECURITY CONTROLs
(7:28)
-
Start
10-JAILBREAKING BASICS
(7:42)
-
Start
11-INSTALLATIONS
(18:24)
-
Start
12-INSTALLING CHALLANGE APPS
(7:50)
-
Start
13-IOS APP DIRECTORY STRUCTURE
(12:03)
-
Start
14-SQLITE DATA
(10:52)
-
Start
15-PLIST FILES
(6:06)
-
Start
16-NSUSER DEFAULTS
(3:42)
-
Start
17-CORE-DATA
(5:38)
-
Start
18-KEYCHAIN
(9:14)
-
Start
19-LOGGING
(4:20)
Android Application Penetration Testing - Part 1
Available in
days
days
after you enroll
-
Preview1.1 Introduction to Android (4:25)
-
Preview1.2 Android architecture (7:38)
-
Preview1.3 Software Installation (7:06)
-
Preview1.4 Creating an emulator (4:24)
-
Start2.1 Android Security Model (6:52)
-
Start2.2 App Sandboxing (8:02)
-
Start2.3 Secure Interprocess Communication (10:17)
-
Start2.4 Application Signing (8:18)
-
Start2.5 App Permissions (7:27)
-
Start3.1 App Structure (6:45)
-
Start3.2 Building a simple app (11:31)
-
Start4.1 Introduction (2:53)
-
Start4.2 M1-SharedPreferences (7:19)
-
Start4.3 M1-Shared Preferences (3:40)
-
Start4.4 M1 SQLITE (7:43)
-
Start4.5 M1 SQLITE (3:27)
-
Start4.6 Copy Paste Buffer (7:18)
-
Start4.7 Copy Paste Code (1:46)
-
Start4.8 Logging (5:11)
-
Start4.9 Logging Code (2:08)
-
Start4.10 Poor Authorization and Authentication (3:43)
-
Start4.11 Broken Crypto (8:17)
-
Start4.12 Client Side Injection-1 (3:30)
-
Start4.13 Look at the code (2:59)
-
Start4-14 Client Side Injection 2 (2:19)
-
Start4-15 A look at the code (2:45)
-
Start4-16 Improper Session Management (4:07)
-
Start4-17 Reversing intro (2:17)
-
Start4.18 APKTOOL (3:39)
-
Start4.19 dex2jar (3:24)
-
Start4.20 Finding Content URIs using APKTOOL (3:21)
Android Application Penetration Testing - Part 2
Available in
days
days
after you enroll
-
Start5.1 Setting up drozer (5:05)
-
Start5.2 Intent Spoofing (8:57)
-
Start5.3 Content Provider Leakage (7:02)
-
Start5.4 SQL Injection in Content Providers (9:54)
-
Start6.1 A look at android exploit mitigatioin techniques (3:53)
-
Start6.2 I m running ARM (2:46)
-
Start6.3 GDB setup (6:30)
-
Start6.4 Running a C program on your device (6:44)
-
Start6.5 Format String Vulnerability (9:56)
-
Start6.6 Transport Layer Security - SSL (7:22)
-
Start7.1 Overview of Android forensics Forensics (9:32)
-
Start7.2 SQLite data recovery (5:26)
iOS Application Penetration Testing - Part 1
Available in
days
days
after you enroll
-
Preview1-Course-Introduction (6:17)
-
Preview2-credits (3:01)
-
Preview3-introduction-to-ios (4:25)
-
Preview4-ios-app-basicsmp4 (4:03)
-
Start5-ios-architecturemp4 (9:11)
-
Start6-setting-up-xcode (7:47)
-
Start7-adding-functionality-to-helloworld-app (10:00)
-
Start8-Inbuilt-security-model (9:06)
-
Start9-SECURITY CONTROLs (7:28)
-
Start10-JAILBREAKING BASICS (7:42)
-
Start11-INSTALLATIONS (18:24)
-
Start12-INSTALLING CHALLANGE APPS (7:50)
-
Start13-IOS APP DIRECTORY STRUCTURE (12:03)
-
Start14-SQLITE DATA (10:52)
-
Start15-PLIST FILES (6:06)
-
Start16-NSUSER DEFAULTS (3:42)
-
Start17-CORE-DATA (5:38)
-
Start18-KEYCHAIN (9:14)
-
Start19-LOGGING (4:20)
Your Instructor

InSEC-Techs
InSEC-Techs (Information Security Technologies) established 2010 April, is based in Hyderabad, INDIA, fastest growing IT Security training company with strong presence in 180+ countries and 3000+ students in Online & classroom formats delivering courses like ethical hacking ,web , metasploit, iOS and android penetration testing classroom and videos courses.
InSEC-Techs have completed 5 journey of training in above said subjects and has places hundreds of students in private and public sectors.
We conduct training programs as Classroom, Online instructor led and Online self paced video learning (e-learning) formats with online school hosted on EHacking.net
Reviews







