Mobile Application Security
A detailed course on Mobile Application Security issues & solutions.
This course covers all key aspects of Mobile Security practices, including Android Security Architecture and iOS Application Security. It is the ideal training programme for anyone interested in mastering Mobile Application Security & understanding the best practices in security posture of Mobile apps.
Benefits of choosing this course
Benefits of choosing the Mobile Application Security course
Gain significant expertise in Mobile Application Security with this comprehensive training.
Get tonnes of hands-on practice in Android Testing Environment, Mobile Application Security Testing & iOs Application Testing.
Get an in-depth understanding of Mobile Application vulnerabilities and how to deal with them.
Highlights of the Mobile Application Security course
Several hands-on lab sessions that give you hands-on practice in Application Testing tools and techniques.
Extensive assessments that help you test your learning.
Downloadable PDFs for easy reference and revision.
- Key Learning Objectives
- Downloads
- About
-
Key Learning Objectives
-
Completing this course guarantees a certain degree of mastery in all the core subjects pertaining to Android
and iOS Mobile Application Security including:
- Android Application Basics, Components and how to set up an Android Testing Environment
- iOS Application Basics, Components and how to set up an iOS Testing Environment
- ADB and its Commands
- Application Signing in Android
- APK File Basics
- OWASP Top 10 Improper Platform Usage, Insecure Data Storage, Insecure Communication, Insufficient Cryptography, Insecure Authorisation, Poor Code Quality, Code Tampering and Reverse Engineering and Extraneous Functionality .
- Exploiting Android and Metasploit Framework
- iOS Data Storage
- iOS Jailbreaking and its types
-
Direct Downloads
Directly download the full Learning Objectives of the course here
Templates. Worksheets & Mind-maps
When you enrol in this course you will have access to several worksheets & templates that you can use immediately. Take a look at the course curriculum, below, to see whats included in this course.
The image immediately below is a gallery view of some of the templates and collateral available to students.
Continuing Professional Development
CPD points can be claimed for this course at the rate of 1 point per hour of training for this NCSC-certified and CIISec-approved course (8 points for one-day public course and 15 points for the two-day internal workshop - for when organisations host this course internally).
CIPR Student-Only Incident Response Plan Template
As a student you get access to unique content including our highly acclaimed Cyber Incident Response Plan Template. If you want, you can download the FREE version of the Incident Response Plan template here.
-
About
Example Curriculum
- M.1.1.1 Introduction to Mobile Applications and Android (4:55)
- M.1.1.2 Android Application Basics (1:03)
- M.1.1.3 Android Application Components (4:34)
- M.1.1.4 Setting Up Android Testing Environment (1:00)
- M.1.1.5 ADB and its Commands (1:45)
- M.1.1.5.A ADB and its Commands (Lab) (1:38)
- M.1.1.5.B ADB and its Commands (Lab) (1:30)
- M.1.1.5.C ADB and its Commands (Lab) (1:40)
- M.1.1.5.D ADB and its Commands (Lab) (1:50)
- M.1.1.6 Application Signing in Android (2:39)
- M.1.1.6.A Application Signing in Android (Lab) (1:56)
- M.1.1.7 APK File Basics (1:47)
- M.1.1.7.A APK File Basics (Lab) (1:20)
- M.1.1.7.B APK File Basics (Lab) (2:37)
- M.1.1.8 Mobile OWASP Top 10 Improper Platform Usage (0:31)
- M.1.1.8.A Mobile OWASP Top 10 Improper Platform Usage (Lab) (3:35)
- M.1.1.9 Mobile OWASP Top 10 Insecure Data Storage (0:37)
- M.1.1.9.A Mobile OWASP Top 10 Insecure Data Storage (Lab) (2:28)
- M.1.1.10 Mobile OWASP Top 10 Insecure Communication (0:17)
- M.1.1.10.A Mobile OWASP Top 10 Insecure Communication (Lab) (1:56)
- M.1.1.11 Mobile OWASP Top 10 Insecure Authentication (0:18)
- M.1.1.11.A Mobile OWASP Top 10 Insecure Authentication (Lab) (1:44)
- M.1.1.12 Mobile OWASP Top 10 Insufficient Cryptography (0:22)
- M.1.1.12.A Mobile OWASP Top 10 Insufficient Cryptography (Lab) (4:31)
- M.1.1.13 Mobile OWASP Top 10 Insecure Authorization (0:19)
- M.1.1.13.A Mobile OWASP Top 10 Insecure Authorization (Lab) (1:28)
- M.1.1.14 Mobile OWASP Top 10 Poor Code Quality (0:18)
- M.1.1.14.A Mobile OWASP Top 10 Poor Code Quality (Lab) (1:43)
- M.1.1.15 Mobile OWASP Top 10 Code Tampering and Reverse Engineering (5:16)
- M.1.1.15.A Mobile OWASP Top 10 Code Tampering and Reverse Engineering (Lab) (1:09)
- M.1.1.16 Mobile OWASP Top 10 Extraneous Functionality (0:23)
- M.1.1.16.A Mobile OWASP Top 10 Extraneous Functionality (Lab) (1:43)
- M.1.1.17 Mobile Application Security Testing (8:20)
- M.1.1.17.A Mobile Application Security Testing (Lab) (3:03)
- M.1.1.17.B Mobile Application Security Testing (Lab) (2:04)
- M.1.1.17.C Mobile Application Security Testing (Lab) (4:20)
- M.1.1.18 Other Vulnerabilities - Client Side Injections (1:04)
- M.1.1.18.A Other Vulnerabilities - Client Side Injections (Lab) (2:36)
- M.1.1.19 Other Vulnerabilities - Logging Based Vulnerabilities (0:54)
- M.1.1.20 Other Vulnerabilities Bypassing SSL Pinning (1:45)
- M.1.1.20.A Other Vulnerabilities Bypassing SSL Pinning (Lab) (3:10)
- M.1.1.21 Other Vulnerabilities Leaking Content Provider (1:07)
- M.1.1.21.A Other Vulnerabilities Leaking Content Provider (Lab) (4:30)
- M.1.1.22 Exploiting Android with Metasploit Framework (0:35)
- M.1.1 Mobile Android (PDF)
- M.2.2.1 Introduction to iOS (4:55)
- M.2.2.2 iOS Application Basics (1:16)
- M.2.2.3 iOS Jailbreaking and its types (0:46)
- M.2.2.4 Setting up a Testing Environment for iOS (1:20)
- M.2.2.5 iOS Data Storage (1:47)
- M.2.2.5.A iOS Data Storage (Lab) (2:52)
- M.2.2.6 Tools and Techniques for iOS Application Testing (1:45)
- M.2.2.6.A Tools and Techniques for iOS Application Testing (Lab) (7:00)
- M.2.2 Mobile iOS (PDF)
Sign up and Start Today
Pay-in-full in your local currency (where available)
We take all major forms of payment and we use secure checkout.
Featured Products
Our most popular courses and offers.
Mobile Application Security is a key component in the overall cybersecurity posture of your business. Understanding Mobile Application Security challenges & solutions along with being prepared for a crisis with a Cyber Incident Response Playbook & effective Incident Response Plans is a sound strategy to stay on top of cyber threats.