Black Friday Offer: 60% Off. Use Code BLACKFRIDAY60
Android Is Awesome. But Why This Training?
Key Benefits
This course offers a State-of-the-Art Training Lab Application that provides hands-on practice with real-world scenarios. The Updated Course Content ensures you learn the latest techniques and stay ahead in the ever-evolving field of iOS security. With an Immersive Learning Experience, you'll engage deeply with the material through interactive sessions. Additionally, our Dedicated Chat Environment offers continuous support and collaboration with experts and peers, making this training truly stand out.
Discover the Course Content
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- App Compilation (2:24)
- Android APK File Structure (9:55)
- Understanding Classes.dex (7:29)
- Understanding Android Manifest (15:33)
- Android App Components - Activity (6:25)
- Android App Components - Intent (9:44)
- Android App Components - Fragments (8:10)
- Android App Components - Content Providers (20:45)
- Android App Components - Services (11:37)
- Android Inter Process Communication (8:20)
- Android App Components - Receivers (6:30)
- Application Signing (7:45)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Dynamic Analysis - Info Gathering (14:18)
- Dynamic Analysis - Debugging (22:57)
- ADB In Action - Part 1 (23:24)
- ADB In Action - Part 2 (16:24)
- Intercepting Network Traffic (19:27)
- Understanding SSL Pinning (11:57)
- Deciphering SSL Pinning Implementation (28:01)
- Bypassing SSL Pinning with Frida (28:24)
- Understanding Frida Script For SSL Pinning Bypass (16:37)
- Objection in Action (12:30)
- Bypassing Root Detection (31:30)
- Sensitive Data Leakage via Logs (19:36)
- Unintentional Data Leakage (10:58)
- Local Data Storage Analysis (16:30)
- Exploiting Broadcasts (15:11)
- Exploiting Media Projection API (16:43)
- Finding & Exploiting Deeplink (17:55)
- The Hidden Code (7:58)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Android OS Architecture and Permission Model (17:20)
- Android App components (9:42)
- Various types of Mobile Apps (12:24)
- Genymotion Emulator & Mobexler Setup (7:22)
- Getting started with adb (15:38)
- Setting up Proxy(MITM) (13:22)
- Analyzing APK manually (11:22)
- Challenge solution (10:46)
- Mobile Security Framework (6:40)
- Bypassing SSL Pinning using Frida and Objection (8:59)
- Bypassing SSL Pinning using Xposed framework (2:18)
- Additional Video - Android Network Traffic Capture (11:59)
- Xposed framework module (4:26)
- Sensitive data leakage via logs (8:48)
- Unintentional data leakage (8:50)
- Insecure Data Storage (8:58)
- Exploiting Android broadcasts (Intent Sniffing) (6:43)
- Media Projection in Android (7:45)
- Understanding Android Links (Deeplinks) (4:59)
- Finding & exploiting Deep links (8:02)
- Patching Android Apps with Objection (8:47)
- Introduction to Drozer (6:55)
- Dynamic Analysis using Drozer (16:34)
- Scripting Drozer Module (16:51)
- Static analysis of Xamarin Apps (15:48)
Available in
days
days
after you enroll