Location
-
Format
What’s this? Ways to train
Classroom
Live, instructor-led training in a standard, professional classroom environmentVirtual
Live, instructor-led training conducted over the internet, with hands-on labsOnline
An online, HTML5, self-paced learning experience available for all coursesOn-site
Private training for your entire team, delivered at your location, a training center, or onlineVideo classroom
Learn more about our training formats
High-definition video of our most popular courses, streamed to your laptop or personal device
-
3 Days
-
All of our private classes are customized to your organization's needs.
-
Click on the button below to send us your details and you will be contacted shortly.
Already purchased this offering? Log in
Request more information
Inquiry for: Myself My Company
By providing your contact details, you agree to our Privacy Policy
Thank You
Our learning consultant will get back to you in 1 business day
Certified Android Mobile Security
WHAT YOU WILL LEARN
This course will enable Security Professionals & Android developers to understand Top 10 OWASP Mobile Security Issues & Common mistakes mobile programmers commit leading to Vulnerabilities and Attacks. This course also covers on how to test your mobile applications using the real hacker methodologies (manual hacking) and tools to find the vulnerabilities and fix / harden them before an attack on your application / infrastructure.
AUDIENCE
IT Managers, IT Security Officers, System Administrators, Network administrators, Developers, Security Posture Assessors & Pentesters, IT Security Auditors and anyone who is concerned about deploying or managing Mobile Applications in the Enterprise
METHODOLOGY
This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises
Modules
• Introduction to Android
• Installing Android Studio
• Android Emulator
• Root Privilege
• Creating “Hello World” Android Application
• Android Debug Bridge (ADB)
• Shell Commands
• Activity Manager (AM)
• Package Manager (PM)
• OWASP Mobile Security Project – MobiSec
• Kali Configuration
• Installing & Configuring Santoku OS
• APK & Dex2Jar
• Proxy Tools
• Drozer
• Digging into Android App
• Android Package Files (APKs) and Unpacking APKs
• Inspecting application certificates and signatures
• How to verify application signature (Tamper Protection)
• AndroidManifest.xml Inspection
• Decoding XML/Resource Files
• Decompiling Android Executable Files
• Interacting with the activity manager via ADB
• Local file inclusion
• Client-side injection attacks
• Lack of Binary Protections
• Source Code Review
• Securing application components
• Protecting components with custom permissions
• Protecting content provider paths
• Debugging the Android processes using the GDB server
• Tamper protection by detecting the installer, emulator, and debug flag
• Removing all log messages with ProGuard
• Advanced code obfuscation with DexGuard
• Exploiting Debugging Application
• Auditing Android Applications
• Passive & Active analysis
• Network Sniffing & Extracting Sensitive Data
• HTTP/S Proxy Interception
• Unsafe sensitive data transmission
• Insufficient Transport Layer Protection
• Unintended Data Leakage
• Broken Cryptography
• Improper Session Handling
• HTTPS and SSL
• Path traversal vulnerability
• SQLite in Depth
• SQL injection : Attacks & Defences
• Cross Site Scriptiong
• Other Untrusted Inputs
• Weak Server Side Controls
• WebView vulnerability
• Using WebView in the application
• Infecting legitimate APKs
• Vulnerabilities in AD libraries
• Social Engineering Toolkit (SET)
• Remote Connection
• Key Logger
• Data Stealth
• Vulnerability Assessment and Penetration Testing the Android phones andApps Tools
• Drozer
• Penetration Testing with Android Phones
• zANTI Enterprise Mobile Risk Assessment
• Kali
• Vulnerability Assessment & Penetration Testing Report

Clement Arul
A professional who believes that adaptability of security is directly equal to the affordability of security products, services and trainings. Started creating security products, services and trainings and certifications that are affordable as well as be part of the team in creation Nation Cyber Security Frameworks.Clement is also a two-time recipient award of National Award from Govt of Malaysia: Cyber Security Professional of the Year in 2017 and 2014 as well as a three-time Regional Award winner of Cyber Security Professional of the Year Asia and APAC in 2020, 2019 and 2017. He was also awarded as APAC Cyber Security Educator of the Year in 2020 and 2019. Read More
Course Reviews
0
0 Ratings