Companies Home Search Profile

The Complete Mobile Ethical Hacking Course

Focused View

Codestars • over 2 million students worldwide!,Atil Samancioglu

26:45:39

200 View
  • 1 - Introduction and Welcome.mp4
    01:40
  • 2 - Before We Start.mp4
    05:31
  • 3 - Introduction to Lab Setup.mp4
    00:35
  • 4 - What is Virtual Machine.mp4
    02:43
  • 5 - Installing Virtualbox for Windows Users.mp4
    15:11
  • 6 - Installing Virtualbox for MAC Users.mp4
    09:53
  • 7 - Kali Linux Download.mp4
    14:28
  • 8 - Kali Linux Download Links.html
  • 9 - Kali Linux Installation.mp4
    19:07
  • 10 - Problem Solving Windows.mp4
    10:46
  • 11 - Solving Kali Installation Problems Iso Installation.mp4
    12:50
  • 12 - Problem Solving MAC.mp4
    19:42
  • 13 - Solutions to Common Problems and Links.html
  • 14 - Taking Snapshots.mp4
    09:54
  • 15 - Kali Linux Overview.mp4
    13:49
  • 16 - Navigation.mp4
    11:23
  • 17 - Moving Stuff.mp4
    08:24
  • 18 - Privilege and Permissions.mp4
    14:40
  • 19 - Linux Folders.mp4
    08:01
  • 20 - Package Managers.mp4
    07:56
  • 21 - Nano.mp4
    05:14
  • 22 - Changing Passwords.mp4
    06:29
  • 23 - Mobile Backdoors Introduction.mp4
    00:41
  • 24 - Backdoor Android vs iOS.mp4
    08:45
  • 25 - What is Payload.mp4
    07:56
  • 26 - IP Address.mp4
    09:53
  • 27 - Tunnel Services.mp4
    10:36
  • 28 - APK Process.mp4
    09:11
  • 29 - Listening for Connections.mp4
    09:33
  • 30 - Signing Process.mp4
    07:34
  • 30 - signature.txt
  • 31 - Hacking Phone.mp4
    11:49
  • 32 - Introduction to Android Studio Fundamentals.mp4
    00:40
  • 33 - JDK Installation Windows.mp4
    11:32
  • 34 - JDK Installation MAC.mp4
    05:48
  • 35 - Android Studio Installation Windows.mp4
    05:41
  • 36 - Android Studio Installation MAC.mp4
    04:57
  • 37 - SDK Installation.mp4
    03:54
  • 38 - Creating First Project.mp4
    16:36
  • 39 - Android Studio Overview.mp4
    12:18
  • 40 - User Interface.mp4
    08:20
  • 41 - Connecting Views with Code.mp4
    08:54
  • 42 - Changing Image.mp4
    05:27
  • 43 - Opening Title Bar.mp4
    01:01
  • 44 - Introduction to Java Fundamentals.mp4
    00:28
  • 45 - Java Basics.mp4
    19:16
  • 46 - Variables.mp4
    08:49
  • 47 - Data Types Continued.mp4
    08:40
  • 48 - Variable or Constant.mp4
    03:17
  • 49 - Arrays.mp4
    11:10
  • 50 - Array List.mp4
    04:56
  • 51 - Set.mp4
    02:53
  • 52 - HashMap.mp4
    06:04
  • 53 - Conditions.mp4
    10:14
  • 54 - If Statements.mp4
    05:32
  • 55 - Switch.mp4
    06:51
  • 56 - For Loop.mp4
    07:45
  • 57 - For Loop Continued.mp4
    03:44
  • 58 - While Loop.mp4
    03:32
  • 59 - Activity Lifecycle.mp4
    12:28
  • 60 - Methods.mp4
    10:28
  • 61 - Scope.mp4
    05:26
  • 62 - Classes.mp4
    06:42
  • 63 - Constructor.mp4
    06:12
  • 64 - Access Levels.mp4
    06:00
  • 65 - Getter and Setter.mp4
    04:55
  • 66 - Java Fundamentals GitHub Codes.html
  • 67 - Calculator User Interface.mp4
    08:38
  • 68 - Calculator Constraints.mp4
    06:33
  • 69 - Connecting Views.mp4
    08:42
  • 70 - Calculator Codes.mp4
    08:00
  • 71 - Safe Calculator.mp4
    08:36
  • 72 - Calculator GitHub Codes.html
  • 73 - Android Development in 10 Minutes.mp4
    15:29
  • 74 - Introduction to iOS Development Fundamentals.mp4
    00:38
  • 75 - Swift on Windows.mp4
    04:25
  • 76 - MacBook Setup.mp4
    08:37
  • 77 - Creating First Project.mp4
    10:56
  • 78 - Xcode Overview.mp4
    14:09
  • 79 - Simulator.mp4
    05:24
  • 80 - User Interface.mp4
    11:40
  • 81 - Connecting Views.mp4
    06:49
  • 82 - Changing Image with Code.mp4
    05:33
  • 83 - Downloading Projects.mp4
    01:58
  • 84 - Options for Writing.mp4
    10:52
  • 85 - Variables and Constants.mp4
    11:06
  • 86 - Variable Types.mp4
    10:01
  • 87 - Predefining Types.mp4
    13:03
  • 88 - Arrays.mp4
    14:37
  • 89 - Set.mp4
    08:44
  • 90 - Dictionaries.mp4
    08:32
  • 91 - While Loop.mp4
    11:17
  • 92 - For Loop.mp4
    08:04
  • 93 - If Controls.mp4
    11:12
  • 94 - Functions.mp4
    11:24
  • 95 - Optionals.mp4
    13:32
  • 96 - Worst Calculator Assignment.mp4
    02:08
  • 97 - Calculator Design.mp4
    08:13
  • 98 - Calculator Codes.mp4
    13:46
  • 99 - Safety and Scope.mp4
    12:46
  • 100 - What is OOP.mp4
    06:49
  • 101 - Initiliazer.mp4
    10:47
  • 102 - What is Enum.mp4
    07:07
  • 103 - What is Inheritance.mp4
    08:22
  • 104 - Access Levels.mp4
    05:33
  • 105 - GitHub Links.html
  • 106 - Introduction to Rooting & JailBreaking.mp4
    00:42
  • 107 - What is Rooting & Jail Breaking.mp4
    06:23
  • 108 - Jail Break Tools.mp4
    07:17
  • 109 - Jail Break Process.mp4
    06:36
  • 110 - iPad SSH.mp4
    11:16
  • 111 - Android Installing APKs.mp4
    09:04
  • 112 - Rooting Android.mp4
    04:14
  • 113 - Android Reverse Engineering Introduction.mp4
    00:52
  • 114 - Reverse Engineering Tools.mp4
    08:22
  • 115 - Kali Reverse Engineering Tools.mp4
    06:04
  • 116 - MAC Reverse Engineering Tools.mp4
    13:48
  • 117 - Hello World App.mp4
    12:35
  • 118 - Creating APK.mp4
    14:04
  • 119 - Dalvik Bytecode.mp4
    06:51
  • 120 - App Manipulation.mp4
    09:51
  • 120 - Dalvik Byte Code Cheat Sheet.txt
  • 121 - Signing.mp4
    10:36
  • 121 - signature.txt
  • 122 - Jadx Usage.mp4
    09:59
  • 123 - ProGuard Usage.mp4
    08:55
  • 124 - Obfuscated APK Decryption.mp4
    06:37
  • 125 - Game Hacking Practice.mp4
    06:50
  • 125 - Word Game Link.txt
  • 126 - Word Game Codes.mp4
    06:17
  • 127 - Reverse Engineering Advanced.mp4
    11:50
  • 128 - Method Manipulation.mp4
    09:58
  • 129 - Hacking the Game.mp4
    03:45
  • 130 - GitHub Links.html
  • 131 - iOS Reverse Engineering Introduction.mp4
    01:01
  • 132 - Jail Break Detection.mp4
    11:51
  • 132 - Jail Break Detection.txt
  • 132 - Jail Break Detection Swift.txt
  • 133 - Assembly.mp4
    09:25
  • 134 - Hexademical.mp4
    12:58
  • 135 - Assembly Hints.mp4
    08:05
  • 136 - Cycript.mp4
    16:09
  • 136 - Cycript Tricks.txt
  • 137 - Manipulating App in Runtime.mp4
    06:43
  • 138 - Swift Challanges.mp4
    11:21
  • 139 - GitHub Links.html
  • 140 - Cloud Security Introduction.mp4
    01:10
  • 141 - Firebase Security Practice.mp4
    06:01
  • 141 - Secure Tweet GitHub Link.txt
  • 142 - What is Firebase.mp4
    07:08
  • 143 - Firebase Integration.mp4
    08:49
  • 144 - Dependency Work.mp4
    06:38
  • 145 - Preparing Files.mp4
    08:06
  • 146 - XML Work.mp4
    06:30
  • 147 - Java Files.mp4
    05:36
  • 148 - Testing.mp4
    11:39
  • 149 - How SecureTweet Works.mp4
    07:43
  • 150 - Reverse Engineering.mp4
    09:28
  • 151 - Getting Project ID.mp4
    06:32
  • 152 - Getting Collection Name.mp4
    05:42
  • 153 - Proxy Operations.mp4
    07:46
  • 154 - Emulator Proxy.mp4
    09:21
  • 155 - SSL Certificates.mp4
    07:15
  • 156 - APK Manipulation.mp4
    10:23
  • 157 - HTTPS Listening.mp4
    11:19
  • 158 - Hacking Firestore.mp4
    15:53
  • 159 - Safe Database Rules.mp4
    05:42
  • 160 - Firestore Security Rules In Depth.mp4
    09:08
  • 161 - GitHub Links.html
  • 162 - CTF Introduction.mp4
    01:07
  • 163 - CTF GitHub Link.txt
  • 163 - CTF Practice.mp4
    04:10
  • 164 - Installing Genymotion.mp4
    10:12
  • 165 - Genymotion Settings.mp4
    05:51
  • 166 - Server Setup Windows.mp4
    10:00
  • 167 - Server Setup MAC.mp4
    02:12
  • 168 - Running App.mp4
    03:41
  • 169 - Bypassing Root Detection.mp4
    21:04
  • 170 - Activity Manipulation.mp4
    08:50
  • 171 - Simple Admin Flaw.mp4
    02:59
  • 172 - Admin Vulnerability.mp4
    04:38
  • 173 - Cryptology Hacking.mp4
    10:25
  • 174 - Hacking Content Providers.mp4
    08:01
  • 175 - GitHub Links.html
  • 176 - InNetwork Attacks Introduction.mp4
    00:36
  • 177 - What is MITM.mp4
    08:57
  • 178 - USB WiFi Card Options.mp4
    05:29
  • 179 - Kali Linux WiFi Card List.html
  • 180 - Connecting USB WiFi Card.mp4
    06:36
  • 181 - Solutions to Common Connection Problems.html
  • 182 - Bettercap Installation.mp4
    07:24
  • 183 - ARP Attack.mp4
    06:21
  • 184 - HTTPS Importance.mp4
    09:59
  • 185 - Currency Converter GitHub Links.html
  • 186 - What is API Security.mp4
    12:38
  • 187 - DigitalOcean Free Credit Link.html
  • 188 - Creating Server.mp4
    15:43
  • 189 - Installing API in Server.mp4
    12:36
  • 190 - Burpsuite Settings.mp4
    16:23
  • 191 - Postman.mp4
    17:16
  • 192 - Broken Object Authorization.mp4
    15:15
  • 193 - Broken Authentication.mp4
    18:18
  • 194 - Excessive Data Exposure.mp4
    15:36
  • 195 - One Time Password Bypass.mp4
    10:46
  • 196 - Broken Function Level Authentication.mp4
    08:01
  • 197 - Mass Assignment.mp4
    05:19
  • 198 - Cors.mp4
    06:41
  • 199 - SQLi.mp4
    13:34
  • 199 - sqli.txt
  • 200 - Improper Asset Management.mp4
    09:12
  • 201 - Closing.mp4
    02:55
  • 202 - Further Tools & Reading Materials.html
  • Description


    Learn how hackers attack phones, mobile applications and mobile devices with latest technology and protect yourself!

    What You'll Learn?


    • Mobile Cyber Security for Mobile Applications & Devices
    • Mobile Applications and Games Penetration Tests
    • Mobile Device Penetration Tests
    • Android & iOS Fundamentals
    • Java & Swift Fundamentals
    • Ethical Hacking Fundamentals
    • Reverse Engineering
    • Mobile Application Development Fundamentals

    Who is this for?


  • Students who want to learn about mobile ethical hacking
  • Students who want to learn about mobile application penetration testing
  • Mobile developers who want to learn about safe development
  • Cyber security specialists looking forward to expand their horizon into mobile world
  • What You Need to Know?


  • Computer with minimum 4GB RAM
  • More details


    Description

    Welcome to Mobile Ethical Hacking From Scratch online training!

    We are going to start from scratch in this course and aim to learn all the details related to Ethical Hacking for Mobile Applications & Mobile Devices. Without any need of prior knowledge you will understand how hackers attack mobile applications & devices and protect yourself against these attacks. You will build your own hacking lab on your computer so that you can practice all the things that we are going to learn in this course.

    Every student who wants to build their own server for API Pentesting section will be given free 25$ - 100$ credits from Digital Ocean.

    This course is given by Atil Samancioglu who has more than 250.000 students on Udemy. Atil teaches Cyber Security & Mobile Application Development and he is also Mobile Application Development Instructor in one of the most prestigious universities in Europe.

    You can see some of the topics that we are going to cover through the course:

    • Backdoor for Mobile Devices

    • Reverse Engineering

    • Game Hacking

    • App Manipulation

    • Network Monitoring

    • Linux Fundamentals

    • Firebase Hacking & Firebase Security

    • Root & JailBreak Operations

    • Dalvik Bytecode

    • Cycript

    • Jadx

    • Apktool

    • CTF Practices

    • Android Mobile Application Fundamentals

    • iOS Mobile Application Fundamentals

    • Java Fundamentals

    • Swift Fundamentals

    • API Pentesting

    Content

    This course is ideal for students who are willing to learn mobile device and mobile application penetration testing and ethical hacking. Whether you are a professional developer or just a beginner it does not matter. We are going to start from scratch and aim to learn all the details. At the end of the course you will be able to understand the vulnerabilities in real world and learn how to fix them.

    Throughout the course we are not going to focus on pure theory. We are going to practice everything we learn with special apps and challenges specifically created for this course only! We are going to have real time hacking exercise.

    Important Notice: You should use all the information in this course in legal boundaries. Please refer to your local cyber security laws and make sure you are on the Ethical Hacking side. All students taking this course must commit to this rule.

    Who this course is for:

    • Students who want to learn about mobile ethical hacking
    • Students who want to learn about mobile application penetration testing
    • Mobile developers who want to learn about safe development
    • Cyber security specialists looking forward to expand their horizon into mobile world

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Codestars • over 2 million students worldwide!
    Codestars • over 2 million students worldwide!
    Instructor's Courses
    Best-selling Udemy instructor Rob Percival wants to revolutionize the way people learn to code by making it simple, logical, fun and, above all, accessible.  But as just one man, Rob couldn’t create all the courses his students - more than half a million of them - wanted.   That’s why Rob created Codestars.  Together, the instructors that make up the Codestars team create courses on all the topics that students want to learn in the way that students want to learn them: courses that are well-structured, super interactive, and easy to understand.  Codestars wants to make it as easy as possible for learners of all ages and levels to build functional websites and apps.
    Atil Samancioglu
    Atil Samancioglu
    Instructor's Courses
    Herkese Merhaba,Udemy'de 300.000'den fazla öğrenciye Yazılım, Mobil Uygulamalar ve Siber Güvenlik konuları üzerine eğitim veriyorum. Aynı zamanda mezunu olduğum Boğaziçi Üniversitesi'nde Mobil Geliştirme'ye Giriş dersi veriyorum. Ayrıca eğitim ve yazılım alanlarında hizmet veren Academy Club'ın kurucusuyum.Mesleğiniz ve eğitiminiz ne olursa olsun programlama öğrenmeye bir şans vermeniz gerektiğine inanıyorum. Yıllar geçtikçe dünyamızda kod yazıp okuyabilenlerin oranı hızla yükseliyor. Siz de eğer ileride dijital çağı yakalayan ve hatta yön veren bir birey olmak istiyorsanız doğru yerdesiniz!Eğer aklınızda çok iyi bir mobil uygulama fikri varsa, hayallerinizin peşinden koşuyorsanız, iyi bir geliştirici olarak iş sahibi olmak istiyorsanız, siber güvenlik uzmanı olma yoluna girme niyetindeyseniz  veya sadece teknoloji çağında bir adım daha önde olmak istiyorsanız artık daha fazla beklemenize gerek yok. 300.000'den fazla kişiden 5 üzerinden 4.6 ortalama puan almış eğitimlere kayıt olup hemen başlayabilirsiniz.------------------------------------------------------------------------------------------------------------------------- Hello Everyone,I train more than 300.000 students on Udemy on Development, Mobile Applications and Cyber Security.I am an instructor in Bogazici University, the college that I've graduated back in 2010. I am also the founder of Academy Club which serves in training and software development industry.I believe regardless of your background and your current job; you have to give programming a chance. Code literacy grows disproportionately every year. If you don't want to be outdated digitally in the following years you have to do your best.If you have a very good mobile application idea, if you want to follow your dreams, if you want to have a good job as a software developer, if you want to become a cyber security specials or if you just want to learn about programming you should not wait anymore. You can enroll the best courses which received 4.6 rating out of 5 right now.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 188
    • duration 26:45:39
    • English subtitles has
    • Release Date 2023/06/24