We may earn an affiliate commission when you visit our partners.
Course image
Atil Samancioglu and Codestars • over 2 million students worldwide!

Welcome to Mobile Ethical Hacking From Scratch online training.

Read more

Welcome to Mobile Ethical Hacking From Scratch online training.

We are going to start from scratch in this course and aim to learn all the details related to Ethical Hacking for Mobile Applications & Mobile Devices. Without any need of prior knowledge you will understand how hackers attack mobile applications & devices and protect yourself against these attacks. You will build your own hacking lab on your computer so that you can practice all the things that we are going to learn in this course.

Every student who wants to build their own server for API Pentesting section will be given free 25$ - 100$ credits from Digital Ocean.

This course is given by Atil Samancioglu who has more than 250.000 students on Udemy. Atil teaches Cyber Security & Mobile Application Development and he is also Mobile Application Development Instructor in one of the most prestigious universities in Europe.

You can see some of the topics that we are going to cover through the course:

  • Backdoor for Mobile Devices

  • Reverse Engineering

  • Game Hacking

  • App Manipulation

  • Network Monitoring

  • Linux Fundamentals

  • Firebase Hacking & Firebase Security

  • Root & JailBreak Operations

  • Dalvik Bytecode

  • Cycript

  • Jadx

  • Apktool

  • CTF Practices

  • Android Mobile Application Fundamentals

  • iOS Mobile Application Fundamentals

  • Java Fundamentals

  • Swift Fundamentals

  • API Pentesting

Content

This course is ideal for students who are willing to learn mobile device and mobile application penetration testing and ethical hacking. Whether you are a professional developer or just a beginner it does not matter. We are going to start from scratch and aim to learn all the details. At the end of the course you will be able to understand the vulnerabilities in real world and learn how to fix them.

Throughout the course we are not going to focus on pure theory. We are going to practice everything we learn with special apps and challenges specifically created for this course only.  We are going to have real time hacking exercise.

Important Notice: You should use all the information in this course in legal boundaries. Please refer to your local cyber security laws and make sure you are on the Ethical Hacking side. All students taking this course must commit to this rule.

Enroll now

What's inside

Learning objectives

  • Mobile cyber security for mobile applications & devices
  • Mobile applications and games penetration tests
  • Mobile device penetration tests
  • Android & ios fundamentals
  • Java & swift fundamentals
  • Ethical hacking fundamentals
  • Reverse engineering
  • Mobile application development fundamentals

Syllabus

Introduction
Introduction and Welcome
Before We Start
Lab Setup
Read more
Introduction to Lab Setup
What is Virtual Machine?
Installing Virtualbox for Windows Users
Installing Virtualbox for MAC Users
Kali Linux Download
Kali Linux Download Links
Kali Linux Installation
Problem Solving (Windows)
Solving Kali Installation Problems: Iso Installation
Problem Solving (MAC)
Solutions to Common Problems and Links
Taking Snapshots
Kali Linux Overview
Navigation
Moving Stuff
Privilege and Permissions
Linux Folders
Package Managers
Nano
Changing Passwords
Mobile Backdoors
Mobile Backdoors Introduction
Backdoor Android vs iOS
What is Payload
IP Address
Tunnel Services
APK Process
Listening for Connections
Signing Process
Hacking Phone
Android Studio Fundamentals
Introduction to Android Studio Fundamentals
Android Studio Installation (Windows)
Android Studio Installation (MAC)
SDK Installation
Creating First Project
Android Studio Overview
Running Emulator
User Interface
Writing a Method
Changing Image
Java Fundamentals
Introduction to Java Fundamentals
Java Basics
Variables
Data Types Continued
Variable or Constant
Arrays
Array List
Set
HashMap
Conditions
If Statements
Switch
For Loop
For Loop Continued
While Loop
Activity Lifecycle
Methods
Scope
Classes
Constructor
Access Levels
Getter and Setter
Java Fundamentals GitHub Codes
Calculator User Interface
Calculator Constraints
Connecting Views
Calculator Codes
Safe Calculator
Calculator GitHub Codes
Android Development in 10 Minutes
iOS Development Fundamentals
Introduction to iOS Development Fundamentals
Swift on Windows
MacBook Setup
Xcode Overview
Simulator
Changing Image with Code
Downloading Projects
Options for Writing
Variables and Constants
Variable Types
Predefining Types
Dictionaries
If Controls
Functions
Optionals
Worst Calculator Assignment

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores penetration testing, a skill highly relevant to students interested in information technology security
Develops professional skills and deep expertise in ethical hacking for iOS and Android systems
Taught by Atil Samancioglu, who is recognized for his work as a mobile application development instructor in one of the most prestigious universities in Europe
Students will build their own hacking lab on their computer to practice skills
Focuses on practical experience with special apps and challenges created specifically for the course
Provides free 25$ - 100$ credits from Digital Ocean for students who want to build their own server for API Pentesting

Save this course

Save The Complete Mobile Ethical Hacking Course to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in The Complete Mobile Ethical Hacking Course with these activities:
Review Course Materials Beforehand
Set yourself up for success by reviewing the course syllabus, readings, and assignments before the course begins.
Show steps
  • Download the course materials and syllabus.
  • Preview the assigned readings and videos.
  • Familiarize yourself with the course schedule and assignment due dates.
Review the principles of mobile security
Refresh your understanding of mobile security concepts to prepare for the course.
Browse courses on Mobile Security
Show steps
  • Read through course notes or textbooks on mobile security.
  • Review online articles and resources on mobile security best practices.
Review Java Programming Fundamentals
Refresh your understanding of Java programming concepts, such as variables, data types, and object-oriented principles, to better grasp the course content.
Browse courses on Java Programming
Show steps
  • Review online tutorials or documentation on Java basics.
  • Practice writing simple Java programs using an IDE.
11 other activities
Expand to see all activities and additional details
Show all 14 activities
Organize and review course materials
Stay organized and efficient by keeping your course materials up-to-date.
Show steps
  • Create a system for organizing notes, assignments, and other course materials.
  • Regularly review your materials to ensure understanding and retention.
Follow tutorials on Android and iOS development
Gain hands-on experience with Android and iOS development to enhance your understanding of mobile applications.
Browse courses on Android Development
Show steps
  • Find online tutorials or courses on Android or iOS development.
  • Follow the tutorials step-by-step to create simple mobile applications.
Android Malware Analysis Tutorial
Write a tutorial guide on analyzing Android malware, explaining the techniques and tools used to identify and mitigate threats.
Browse courses on Mobile Security
Show steps
  • Provide an overview of Android malware and its different types.
  • Explain the process of acquiring and analyzing APK files.
  • Describe the use of tools such as JADX and Apktool for decompiling and analyzing code.
  • Discuss common malware behaviors and detection techniques.
Assist other students in the course
Reinforce your understanding of the course material by helping others.
Show steps
  • Identify opportunities to answer questions and provide support to other students in the course.
  • Participate in online forums or discussion groups to engage with other students.
Ethical Hacking Practice Labs
Engage in hands-on practice labs to reinforce ethical hacking techniques and strengthen your cybersecurity skills.
Browse courses on Ethical Hacking
Show steps
  • Set up a virtual environment for ethical hacking practice.
  • Solve challenges related to network scanning, vulnerability assessment, and exploit development.
  • Practice conducting penetration tests on various targets, such as web applications and mobile devices.
  • Document your findings and create reports based on the results of your practice labs.
Attend industry webinars and conferences
Expand your knowledge and connect with professionals in the field of mobile security.
Browse courses on Networking
Show steps
  • Identify relevant webinars and conferences focused on mobile security.
  • Attend the events to listen to industry experts and network with attendees.
Perform penetration testing exercises
Strengthen your penetration testing skills by practicing on real-world mobile applications.
Browse courses on Penetration Testing
Show steps
  • Set up a virtual environment for penetration testing.
  • Download and install mobile application penetration testing tools.
  • Conduct penetration tests on provided mobile applications.
Mobile Application Penetration Test Report
Create a comprehensive report detailing a mobile application penetration test you performed, including vulnerabilities identified and recommendations for remediation.
Show steps
  • Identify the scope of the penetration test, including the target application and its dependencies.
  • Gather information about the target application, such as its architecture, functionality, and network connectivity.
  • Perform vulnerability assessment and penetration testing using industry-standard tools and techniques.
  • Analyze the results of the penetration test and identify potential vulnerabilities and security risks.
  • Develop detailed recommendations for remediating the vulnerabilities identified.
Build a Mobile Security Training App
Enhance your understanding of mobile security concepts by creating a training application that teaches users about best practices and common threats.
Browse courses on Android Development
Show steps
  • Design the app's interface and user experience.
  • Develop the app using Android Studio or Xcode.
  • Create interactive content, quizzes, and simulations to educate users about mobile security.
  • Publish the app on Google Play or the App Store.
Contribute to open-source mobile security projects
Enhance your practical skills and contribute to the mobile security community.
Browse courses on Open Source
Show steps
  • Identify open-source mobile security projects that align with your interests.
  • Review the project documentation and identify areas where you can contribute.
  • Submit pull requests or issue reports to the project maintainers.
Develop a mobile security plan
Apply your knowledge of mobile security to create a comprehensive plan for protecting mobile devices and applications.
Browse courses on Security Strategy
Show steps
  • Identify potential security risks and vulnerabilities in mobile environments.
  • Develop strategies to mitigate identified risks and vulnerabilities.
  • Document the security plan and share it with stakeholders.

Career center

Learners who complete The Complete Mobile Ethical Hacking Course will develop knowledge and skills that may be useful to these careers:
Mobile Security Engineer
A Mobile Security Engineer helps design and build security solutions into an organization's applications. These solutions are typically software-based and focus on the mobile device. Graduates of this Mobile Ethical Hacking Course will have immediately applicable skills thanks to the focus on real-world practice in this course.
Mobile Application Security Analyst
Mobile Application Security Analysts audit and test software apps to ensure they do not contain security flaws that lead to vulnerabilities. They perform ethical hacking to identify these vulnerabilities in the development environment, prior to app release. The Mobile Ethical Hacking Course has a 'learn by doing' curriculum that will make a graduate of this course a strong candidate for a role as a Mobile Application Security Analyst.
Information Security Analyst
Information Security Analysts plan and carry out security measures to protect an organization's computer networks and systems. Graduates of this course will have an advantage in this role, as it requires ethical hacking abilities. These skills are heavily emphasized in this 'learn by doing' course.
Penetration Tester
Penetration Testers find vulnerabilities in computer systems and networks, which can lead to system compromise. This can prevent security breaches. This course is a good fit for a career as a Penetration Tester. The course will help potential Penetration Testers understand hacking from both the attacker and defender side.
Cybersecurity Analyst
Cybersecurity Analysts develop plans and programs to protect an organization's networks and systems. This role provides an organization's first line of defense against data breaches and other cyberattacks. This course can build a foundation for this career because it teaches ethical hacking techniques that a Cybersecurity Analyst can use to assess and prevent threats.
Technical Security Consultant
Technical Security Consultants provide expert guidance, security assessments, and recommendations to help organizations improve their security posture. Graduates of this course can apply the knowledge they have gained from ethical hacking practices to help organizations identify and address security risks.
Security Architect
Security Architects design, deploy, test, and manage an organization's security infrastructure. They must understand the threats to an organization's networks and systems and develop security solutions to address those threats. Ethical hacking knowledge can help strengthen the foundation for a career as a Security Architect. This course can provide this strong ethical hacking foundation.
Ethical Hacker
Ethical Hackers use their knowledge of security vulnerabilities to identify and fix weaknesses in an organization's systems. They work on security assessments, penetration testing, and other security-related tasks. This course can build a foundation for a career as an Ethical Hacker and prepare students for the ethical hacking certification.
Forensic Computer Analyst
Forensic Computer Analysts investigate and analyze digital evidence to support criminal investigations or civil cases. They may also work on security incident response and risk management. Understanding ethical hacking techniques can help build a strong foundation for a career as a Forensic Computer Analyst.
Cloud Security Engineer
Cloud Security Engineers design, implement, and manage security measures for cloud computing environments. They must understand the threats to cloud computing and develop security solutions to address those threats. This course may be helpful in building the ethical hacking skillset that is important for a career as a Cloud Security Engineer.
Security Operations Center (SOC) Analyst
Security Operations Center (SOC) Analysts monitor and analyze security events and respond to security incidents. They must be able to identify and respond to threats to an organization's networks and systems. This course may be helpful in building the skills needed for a career as a Security Operations Center (SOC) Analyst.
Incident Responder
Incident Responders investigate and respond to security incidents. They work to contain the damage from security breaches and restore normal operations. This course may be helpful in building some of the skills needed for a career as an Incident Responder.
Security Auditor
Security Auditors assess an organization's security posture and identify areas for improvement. They may also work on security compliance and risk management. This course may be helpful in providing some of the knowledge needed to work as a Security Auditor.
IT Security Specialist
IT Security Specialists design, implement, and manage security measures for an organization's IT infrastructure. They must understand the threats to an organization's networks and systems and develop security solutions to address those threats. This course may be helpful in providing some of the knowledge needed to work as an IT Security Specialist.
Security Awareness Trainer
Security Awareness Trainers develop and deliver security training programs to employees and other stakeholders. They must be able to communicate security concepts in a clear and concise way. This course may be helpful in providing some of the knowledge needed to work as a Security Awareness Trainer.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in The Complete Mobile Ethical Hacking Course.
Provides a deep dive into the security architecture of the Android operating system. It valuable resource for anyone interested in learning more about how to protect Android devices and applications from attack.
Provides a comprehensive overview of computer security, covering topics such as threat modeling, vulnerability analysis, and penetration testing. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of cryptography, covering topics such as encryption, decryption, and authentication. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of software security assessment, covering topics such as threat modeling, vulnerability analysis, and penetration testing. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of algorithms, covering topics such as sorting, searching, and graph theory. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of computer networks, covering topics such as network protocols, network security, and network performance. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of data structures and algorithms, covering topics such as linked lists, queues, stacks, and trees. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of linear algebra, covering topics such as vectors, matrices, and determinants. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of malware analysis, covering topics such as malware detection, analysis, and mitigation. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of operating systems, covering topics such as process management, memory management, and file systems. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of discrete mathematics, covering topics such as sets, relations, functions, and graphs. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of web application security, covering topics such as threat modeling, vulnerability analysis, and penetration testing. It valuable resource for anyone interested in learning more about this field.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to The Complete Mobile Ethical Hacking Course.
Android App Hacking - Black Belt Edition
Most relevant
LEARN ETHICAL HACKING AND PENETRATION TESTING 5 COURSES...
Most relevant
Hacking in Practice: Intensive Ethical Hacking MEGA Course
Most relevant
Practice Your First Penetration Test: Kali & Metasploit...
Most relevant
The Complete Ethical Hacking Course
Most relevant
Certified Professional Ethical Hacking C)PEH Certification
Most relevant
Ethical Hacking: Web Application Hacking
Most relevant
The Complete Ethical Hacking Course for 2016/2017!
Most relevant
Ethical Hacking: Hacking Mobile Platforms
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser