Companies Home Search Profile

Ethical Hacking: Mobile Devices and Platforms

Focused View

Malcolm Shore

1:56:13

165 View
  • 01. Keeping your mobile devices safe.mp4
    00:49
  • 02. Before watching this course.mp4
    00:43
  • 03. Course disclaimer.mp4
    01:05
  • 01. Understand and test for mobile vulnerabilities.mp4
    06:55
  • 02. Static analysis of applications.mp4
    06:21
  • 03. Dynamic analysis of applications.mp4
    02:24
  • 04. Mobile web testing.mp4
    01:02
  • 01. Understanding the Android operating system.mp4
    06:44
  • 02. Android security model.mp4
    03:46
  • 03. Preparing for Android testing.mp4
    01:38
  • 04. Extracting and reading the manifest file.mp4
    07:28
  • 05. Extracting and reading JavaScript code.mp4
    05:22
  • 06. Recreating Java source code with JAD.mp4
    02:23
  • 07. Browsing applications directly with JADX.mp4
    02:03
  • 08. Getting command-line access with ADB.mp4
    05:23
  • 09. Install an Android emulator from the SDK.mp4
    02:14
  • 10. Dynamic analysis of Android applications.mp4
    05:49
  • 11. Using Drozer to analyze applications.mp4
    04:54
  • 12. Checking for scam phones.mp4
    02:52
  • 01. iOS applications and vulnerabilities.mp4
    04:40
  • 02. Securing iOS applications by design.mp4
    04:52
  • 03. Jailbreaking for command-line access.mp4
    06:45
  • 04. Preparing to test iOS applications.mp4
    03:45
  • 05. Extracting properties and class headers.mp4
    05:28
  • 06. Disassembling iOS executable code.mp4
    05:36
  • 07. Advancing into dynamic analysis of iOS.mp4
    06:25
  • 01. Taking a look at Security Shepherd.mp4
    02:36
  • 02. Watching for bad cryptography.mp4
    02:11
  • 03. Insecure data when in developer mode.mp4
    02:33
  • 01. Next steps.mp4
    01:27
  • Description


    Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too willing to exploit. Security professionals need to know how to close the gaps and protect devices, data, and users from attacks. Join cybersecurity expert Malcolm Shore as he explores the two dominant mobile operating systems, Android and iOS, and shows ways to protect devices through analysis and testing. Watch this course to review the basics of mobile OS models, the toolsets you need for testing, and the techniques for detecting and preventing the majority of security flaws.

    These methods are recognized by EC Council as integral part of those looking to earn their Certified Ethical Hacker certification. The complete CEH BOK can be found at https://www.eccouncil.org/Certification/certified-ethical-hacker/CEH-What-You-Will-Learn.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 30
    • duration 1:56:13
    • Release Date 2023/01/09