Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Mobile Application Security
Module 1: Mobile Application Security, Section 1
M.1.1.1 Introduction to Mobile Applications and Android (4:55)
M.1.1.2 Android Application Basics (1:03)
M.1.1.3 Android Application Components (4:34)
M.1.1.4 Setting Up Android Testing Environment (1:00)
M.1.1.5 ADB and its Commands (1:45)
M.1.1.5.A ADB and its Commands (Lab) (1:38)
M.1.1.5.B ADB and its Commands (Lab) (1:30)
M.1.1.5.C ADB and its Commands (Lab) (1:40)
M.1.1.5.D ADB and its Commands (Lab) (1:50)
M.1.1.6 Application Signing in Android (2:39)
M.1.1.6.A Application Signing in Android (Lab) (1:56)
M.1.1.7 APK File Basics (1:47)
M.1.1.7.A APK File Basics (Lab) (1:20)
M.1.1.7.B APK File Basics (Lab) (2:37)
M.1.1.8 Mobile OWASP Top 10 Improper Platform Usage (0:31)
M.1.1.8.A Mobile OWASP Top 10 Improper Platform Usage (Lab) (3:35)
M.1.1.9 Mobile OWASP Top 10 Insecure Data Storage (0:37)
M.1.1.9.A Mobile OWASP Top 10 Insecure Data Storage (Lab) (2:28)
M.1.1.10 Mobile OWASP Top 10 Insecure Communication (0:17)
M.1.1.10.A Mobile OWASP Top 10 Insecure Communication (Lab) (1:56)
M.1.1.11 Mobile OWASP Top 10 Insecure Authentication (0:18)
M.1.1.11.A Mobile OWASP Top 10 Insecure Authentication (Lab) (1:44)
M.1.1.12 Mobile OWASP Top 10 Insufficient Cryptography (0:22)
M.1.1.12.A Mobile OWASP Top 10 Insufficient Cryptography (Lab) (4:31)
M.1.1.13 Mobile OWASP Top 10 Insecure Authorization (0:19)
M.1.1.13.A Mobile OWASP Top 10 Insecure Authorization (Lab) (1:28)
M.1.1.14 Mobile OWASP Top 10 Poor Code Quality (0:18)
M.1.1.14.A Mobile OWASP Top 10 Poor Code Quality (Lab) (1:43)
M.1.1.15 Mobile OWASP Top 10 Code Tampering and Reverse Engineering (5:16)
M.1.1.15.A Mobile OWASP Top 10 Code Tampering and Reverse Engineering (Lab) (1:09)
M.1.1.16 Mobile OWASP Top 10 Extraneous Functionality (0:23)
M.1.1.16.A Mobile OWASP Top 10 Extraneous Functionality (Lab) (1:43)
M.1.1.17 Mobile Application Security Testing (8:20)
M.1.1.17.A Mobile Application Security Testing (Lab) (3:03)
M.1.1.17.B Mobile Application Security Testing (Lab) (2:04)
M.1.1.17.C Mobile Application Security Testing (Lab) (4:20)
M.1.1.18 Other Vulnerabilities - Client Side Injections (1:04)
M.1.1.18.A Other Vulnerabilities - Client Side Injections (Lab) (2:36)
M.1.1.19 Other Vulnerabilities - Logging Based Vulnerabilities (0:54)
M.1.1.20 Other Vulnerabilities Bypassing SSL Pinning (1:45)
M.1.1.20.A Other Vulnerabilities Bypassing SSL Pinning (Lab) (3:10)
M.1.1.21 Other Vulnerabilities Leaking Content Provider (1:07)
M.1.1.21.A Other Vulnerabilities Leaking Content Provider (Lab) (4:30)
M.1.1.22 Exploiting Android with Metasploit Framework (0:35)
M.1.1 Mobile Android (PDF)
Module 2: Mobile Application Security, Section 2
M.2.2.1 Introduction to iOS (4:55)
M.2.2.2 iOS Application Basics (1:16)
M.2.2.3 iOS Jailbreaking and its types (0:46)
M.2.2.4 Setting up a Testing Environment for iOS (1:20)
M.2.2.5 iOS Data Storage (1:47)
M.2.2.5.A iOS Data Storage (Lab) (2:52)
M.2.2.6 Tools and Techniques for iOS Application Testing (1:45)
M.2.2.6.A Tools and Techniques for iOS Application Testing (Lab) (7:00)
M.2.2 Mobile iOS (PDF)
Mobile Application Security Quiz
Test Your Learning: Easy
Test Your Learning: Medium
Test Your Learning: Difficult
M.2.2.6 Tools and Techniques for iOS Application Testing
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock