The Complete Mobile Ethical Hacking Course
The Complete Mobile Ethical Hacking Course
Beginner
22 Hrs
Learn how hackers attack phones, mobile applications and mobile devices with the latest technology, and protect yourself
Learn how hackers attack phones, mobile applications and mobile devices with the latest technology, and protect yourself
Overview
We are going to start from scratch in this course and aim to learn all the details related to Ethical Hacking for Mobile Applications & Mobile Devices.
Without any need for prior knowledge, you will understand how hackers attack mobile applications & devices and protect yourself against these attacks. You will build your own hacking lab on your computer so that you can practice all the things that we are going to learn in this course.
This course is ideal for students who are willing to learn mobile device and mobile application penetration testing and ethical hacking. Whether you are a professional developer or just a beginner it does not matter.
We are going to start from scratch and aim to learn all the details. At the end of the course, you will be able to understand the vulnerabilities in the real world and learn how to fix them.
Throughout the course, we are not going to focus on pure theory. We are going to practice everything we learn with special apps and challenges specifically created for this course only! We are going to have a real-time hacking exercise.
The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/The-Complete-Mobile-Ethical-Hacking
What You Will Learn
- Learn about mobile cybersecurity for mobile applications and devices
- Learn about mobile applications and games penetration tests
- Learn about Android & iOS Fundamentals
- Learn about Java & Swift Fundamentals
- Learn about Ethical Hacking Fundamentals
Prerequisites
- A Computer with a minimum 4 GB of RAM
Content
Chapter 1: Lab Setup
11 Videos
Introduction to Lab Setup What is Virtual Machine? Installing VirtualBox for Windows Users Installing VirtualBox for Mac Users Installing Kali Linux Solving Kali Installation Problems: ISO Installation Taking Snapshots Kali Linux Overview Linux Commands Changing Password $7 Million Cybersecurity Scholarship by EC-Council Chapter 1 Quiz
Preview
Chapter 2: Mobile Backdoors
9 Videos
Mobile Backdoors Introduction Backdoor Android vs iOS What is Payload? IP Address Tunnel Services APK Process Listening for Connections Signing Process Hacking Phone Chapter 2 Quiz
Preview
Chapter 3: Android Studio Fundamentals
12 Videos
Introduction to Android Studio Fundamentals JDK Installation (Windows) JDK Installation (Mac) Android Studio Installation (Windows) Android Studio Installation (Mac) SDK Installation Creating First Project Android Studio Overview User Interface Connecting Views with Code Changing Image Opening Title Bar Chapter 3 Quiz
Preview
Chapter 4: Java Fundamentals
28 Videos
Introduction to Java Fundamentals Java Basics Variables Data Types Continued Variable or Constant Arrays Array List Set HashMap Conditions If Statements Switch For Loop For Loop Continued While Loop Activity Lifecycle Methods Scope Classes Constructor Access Levels Getter and Setter Calculator User Interface Calculator Constraints Connecting Views Calculator Codes Safe Calculator Android Development in 10 Minutes Chapter 4 Quiz
Preview
Chapter 5: iOS Development Fundamentals
31 Videos
Introduction to iOS Development Fundamentals Swift on Windows MacBook Setup Creating First Project XCode Overview Simulator User Interface Connecting Views Changing Image with Code Downloading Projects Options for Writing Variables and Constants Variable Types Predefined Types Arrays Set Dictionaries While Loop For Loop If Controls Functions Optional Worst Calculator Assignment Calculator Design Calculator Codes Safety and Scope What is OOP? Initializer What is enum? What is Inheritance? Access Levels Chapter 5 Quiz
Preview
Chapter 6: Rooting and Jailbreaking
7 Videos
Introduction to Rooting and Jailbreaking What is Rooting and Jailbreaking? Jailbreak Tools Jailbreak Process iPad SSH Android: Installing APKs Rooting Android Chapter 6 Quiz
Preview
Chapter 7: Reverse Engineering: Android
17 Videos
Android Reverse Engineering Introduction Reverse Engineering Tools Kali Reverse Engineering Tools Mac Reverse Engineering Tools Hello World App Creating APK Dalvik Bytecode App Manipulation Signing Jadx Usage ProGuard Usage Obfuscated APK Decryption Game Hacking Practice Word Game Codes Reverse Engineering Advanced Method Manipulation Hacking the Game Chapter 7 Quiz
Preview
Chapter 8: Reverse Engineering: iOS
8 Videos
iOS Reverse Engineering Introduction Jailbreak Detection Assembly Hexadecimal Assembly Hints Cycript Manipulating App in Runtime Swift Challenges Chapter 8 Quiz
Preview
Chapter 9: Cloud Hacking: Firebase Security
21 Videos
Cloud Security Introduction Firebase Security Practice What is Firebase? Firebase Integration Dependency Work Preparing Files XML Work Java Files Testing How SecureTweet Works Reverse Engineering Getting Project ID Getting Collection Name Proxy Operations Emulator Proxy SSL Certificates APK Manipulation HTTPS Listening Hacking Firestore Safe Database Rules Firestore Security Rules in Depth Chapter 9 Quiz
Preview
Chapter 10: CTF: Banking App Hacking
13 Videos
CTF Introduction CTF Practice Installing Genymotion Genymotion Settings Server Setup (Windows) Server Setup (Mac) Running App Bypassing Root Detection Activity Manipulation Simple Admin Flaw Admin Vulnerability Cryptology Hacking Hacking Content Providers Chapter 10 Quiz
Preview
Chapter 11: In-network Attacks for Mobile Devices
7 Videos
In-network Attacks Introduction What is MITM? USB Wi-Fi Card Options Connecting USB Wi-Fi Card Bettercap Installation ARP Attack HTTPS Importance Chapter 11 Quiz
Preview
This course is part of a learning path
1466 enrollments
Course
The Complete Mobile Ethical Hacking Course
$79.99
skill path
Mastering Mobile Hacking
Learn how hackers attack phones, mobile applications, and mobile devices with the latest technology, and protect yourself
Instructor
Codestars
Get access to only this course
$79.99
One-time PaymentGet access to all 500+ courses with EC-Council Pro
$59.99/Month
Get access to all 500+ courses with EC-Council Pro
$599/Year
Get 2 months free!
Looking to train your team?
Try EC-Council Enterprise ยปReviews
(211 reviews)
5
Average Course Rating
Top Student Reviews
rodrigo ramos
Excellent Content
Randel
is ok
Redentor Del Rosario
great
Vishwas Gowda
Everything is great
Mihail Grigorescu
Level of detail
Herve Nyirinkwaya
Very very amazing Course
Related Courses
469 enrollments
Course
CCNA - Understanding Routers and Switches
$49.99
231 enrollments
Course
CISSP Certification Domains 5, 6, 7, and 8 Video Training
$69.99
809 enrollments
Course
Learn Ethical Hacking by Hacking Real Websites Legally
$69.99