Welcome to Mobile Ethical Hacking From Scratch online training.
Welcome to Mobile Ethical Hacking From Scratch online training.
We are going to start from scratch in this course and aim to learn all the details related to Ethical Hacking for Mobile Applications & Mobile Devices. Without any need of prior knowledge you will understand how hackers attack mobile applications & devices and protect yourself against these attacks. You will build your own hacking lab on your computer so that you can practice all the things that we are going to learn in this course.
Every student who wants to build their own server for API Pentesting section will be given free 25$ - 100$ credits from Digital Ocean.
This course is given by Atil Samancioglu who has more than 250.000 students on Udemy. Atil teaches Cyber Security & Mobile Application Development and he is also Mobile Application Development Instructor in one of the most prestigious universities in Europe.
You can see some of the topics that we are going to cover through the course:
Backdoor for Mobile Devices
Reverse Engineering
Game Hacking
App Manipulation
Network Monitoring
Linux Fundamentals
Firebase Hacking & Firebase Security
Root & JailBreak Operations
Dalvik Bytecode
Cycript
Jadx
Apktool
CTF Practices
Android Mobile Application Fundamentals
iOS Mobile Application Fundamentals
Java Fundamentals
Swift Fundamentals
API Pentesting
Content
This course is ideal for students who are willing to learn mobile device and mobile application penetration testing and ethical hacking. Whether you are a professional developer or just a beginner it does not matter. We are going to start from scratch and aim to learn all the details. At the end of the course you will be able to understand the vulnerabilities in real world and learn how to fix them.
Throughout the course we are not going to focus on pure theory. We are going to practice everything we learn with special apps and challenges specifically created for this course only. We are going to have real time hacking exercise.
Important Notice: You should use all the information in this course in legal boundaries. Please refer to your local cyber security laws and make sure you are on the Ethical Hacking side. All students taking this course must commit to this rule.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.