Mobile Platform Security & Ethical Hacking Certificate Course-2
$400
Mobile Platform Security & Ethical Hacking Certificate Course-2

Mobile Platform Security & Ethical Hacking Certificate Course-2

Event Information

Share this event

Date and Time

Location

Location

Sunstar Hotel Nairobi

Garden Estate Road

Nairobi, Nairobi County 26680

Kenya

View Map

Friends Who Are Going
Event description

Description

Introduction

Mobile platform is today a ubiquitous technology harboring unlimited possibilities. A little tinkering with a mobile device creates a phantom. Today, individuals and businesses are at crossroads in as far as safety of their information is concerned. Mobile devices are the biggest attack surface in most organizations today, yet these same organizations often don't have the skills needed to assess them.

Used in almost all environments

Mobile devices are no longer a convenience technology: they are an essential tool carried or worn by users worldwide, often displacing conventional computers for everyday enterprise data needs. You can see this trend in corporations, hospitals, banks, schools, and retail stores throughout the world. Users rely on mobile devices more today than ever before - we know it, and the bad guys do too.



Date: May 29th - 02nd June, 2017

Fee: USD 400

Venue: Sunstar Hotel, Garden Estate, Off Thika Rd, Nairobi

Click HERE to Book



How will this training benefit you?

This course is designed to give you the skills you need to understand the security strengths and weaknesses in, Android.. With these skills, you will

  1. Evaluate the security weaknesses of built-in and third party applications.

  2. Learn how to bypass platform encryption,

  3. Learn how to manipulate Android apps to circumvent obfuscation techniques.

  4. Leverage automated and manual mobile application analysis tools to identify deficiencies in mobile app network

  5. traffic, file system storage, and inter-app communication channels.

  6. Safely work with mobile malware samples to understand the data exposure and access threats affecting Android devices

  7. Exploit lost or stolen devices to harvest sensitive mobile application data.


  1. Security flaws have always trailed mobile applications.Security flaws have always trailed mobile applications.

Day 1 & 2: Device Architecture and Common Mobile Threats

Overview

The first section of the course quickly looks at the significant threats affecting mobile device deployments, highlighted with a hands-on exercise evaluating network traffic from a vulnerable mobile banking application. As a critical component of a secure deployment, we will examine the architectural and implementation differences and similarities in Android (including Android Marshmallow). Hands-on exercises will be used to interact with mobile devices running in a virtualized environment, including low-level access to installed application services and application data.

Section objectives

  1. to evaluate mobile devices as part of establishing a lab environment for mobile device assessments

  2. Analyze mobile malware affecting Android devices.

  3. Examine the threats of lost and stolen devices (and opportunities for a pen tester)

  4. Client-Side Attacks and Social Engineering

  5. Learn the techniques of bypassing mobile device lock screens.

Topics Covered

  • Mobile Problems and Opportunities

  • Mobile Device Platform Analysis

  • Mobile Device Lab Analysis Tools

  • Mobile Device Malware Threats

Days 3 & 4: Mobile Platform Access and Application Analysis

Section objectives

By the end of this section, the learner will be able to:

  1. Build skills in analyzing mobile device data and applications through rooting and jailbreaking android devices.

  2. Evaluate file system artifacts.

  3. Evaluate the security of mobile applications, using network capture analysis tools to identify weak network protocol use and sensitive data disclosure over the network.

  4. Reverse engineer Android applications using decompilers, disassemblers, and manual analysis techniques.

Topics Covered

  • Unlocking, Rooting and Jailbreaking Mobile Devices

  • Mobile Phone Data Storage and File System Architecture

  • Network Activity Monitoring

  • Static Application Analysis

click the following link to download the full program

Day 5: Penetration Testing Mobile Devices

Section objectives

An essential component of developing a secure mobile device deployment is to perform or outsource a penetration test. Through ethical hacking and penetration testing,

By the end of this section, the learner will be able to:

  1. To examine the mobile devices and infrastructure from the perspective of an attacker,

  2. To identify and exploit flaws that deliver unauthorized access to data or supporting networks.

Topics Covered

  • Fingerprinting Mobile Devices

  • Wireless Network Probe Mapping

  • Weak Wireless Attacks

  • Enterprise Wireless Security Attacks

  • Network Manipulation Attacks

  • Sidejacking Attacks

click the following link to download the full program

By identifying these flaws we can evaluate the mobile phone deployment risk to the organization with practical and useful risk metrics. Whether your role is to implement the pen test, or to source and evaluate the pen tests of others, understanding these techniques will help your organization identify and resolve vulnerabilities before they become incidents.

click the following link to download the full program


Date: May 29th - 02nd June, 2017

Fee: USD 400

Venue: Sunstar Hotel, Garden Estate, Off Thika Rd, Nairobi

Click HERE to Book


Share with friends

Date and Time

Location

Sunstar Hotel Nairobi

Garden Estate Road

Nairobi, Nairobi County 26680

Kenya

View Map

Save This Event

Event Saved