Size: 518 MB

Description

This course introduces students to the security concepts associated with Android Apps. This is an entry level course and we encourage you to take this course if you are a beginner in mobile app security world. This course uses a publicly available vulnerable application to demonstrate how Android App vulnerabilities can be identified. This course teaches you how to identify a variety of Android App vulnerabilities such as Insecure Data Storage, Exported Application Components, Hardcoded Sensitive Data, Insecure Logging etc.

Who this course is for:

  • IT Professionals developing Android Apps
  • Penetration Testers
  • Ethical Hackers
  • Anyone interested in Android App security
  • Beginner cyber security enthusiasts curious about mobile app security

Requirements

  • This course starts from very basics and thus no prior experience is required

What you’ll learn

  • Learn the fundamentals of Android Application Security
  • Learn the fundamentals of Penetration Testing Android Apps
  • Learn how to identify the most common Android Application Vulnerabilities
  • Learn to set up an Android App penetration testing lab
  • Learn how insecure data storage issues can occur in Android Apps
  • Learn how SQL Injection can occur in Mobile Apps
  • Learn how to exploit leaky content providers
  • Learn how intent filters are abused by attackers
  • Learn how web views can be vulnerable
  • Learn how to find hardcoded strings in APK files
  • Learn how to find hardcoded strings in native libraries
  • Learn how Android apps can leak sensitive data

HOMEPAGE – https://www.udemy.com/course/hacking-android-apps-lite-edition/

Download Links-

Note: Comment below if you find any link dead or getting problem in downloading files.

You May Also Like

Hacking and Securing JSON Web Tokens (JWT)
Digital Transformation and Industry 4.0
Hacking and Pentesting iOS Applications (2020 Edition)
Categories: CoursesSecurity

0 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *