1. Home
  2. /
  3. Courses
  4. /
  5. Offensive Security
  6. /
  7. Mobile Penetration Testing

Mobile Penetration Testing

$ 2.000/0.10503035

This course will cover both Android and iOS operating systems and will address all core-level binary vulnerabilities and application-level vulnerabilities, some operating system-level vulnerabilities such as Use After Free that occur in different drivers. The data will be reviewed and evaluated, as well as how to operate and bypass the operating system defense mechanisms that are implemented on ARM processors. Other vulnerabilities that occur at the application level will also be addressed.

View full Syllabus

This course is not currently active

Category: Offensive Security
  • Access to the LMS section is provided only with the Safe Exam Browser, which is only available on Windows, macOS, and iOS operating systems.

Windows

  • Windows 10 and 11 are preferred.
  • Windows 7 and 8.1 will also work.
  • Dual-core processor (2+ GHz).
  • 4+ GB of RAM.
  • Chrome, Firefox or Microsoft Edge will also work.

Macintosh

  • OS X El Capitan
  • Dual-core 1.2 GHz Intel Core M processor.
  • 4+ GB of RAM.
  • Chrome, Firefox or Safari will also work.

Virtual LAB Exercises

  • Access to the online laboratory can be achieved with any browser and any operating system, and there are no obstacles in the laboratory section.

Dedicated Laboratory

Awarding a Valid Certificate

Unlimited Access

Course Highlights

  • This course has been developed and designed at the highest technical level that is valid in the world and is taught in the master’s degree, therefore all the topics of the course will be fully and comprehensively evaluated in a dedicated laboratory, and it has been tried to All the example scenarios should be close to the real world vulnerabilities in order to strengthen the student’s methodology, which can be very important in the discussion of vulnerability discovery.
  • The purpose of designing these courses is to produce an efficient human force that can provide good technical strength for defense security products and solutions in economic goals, for this purpose standardization and completeness of the course is one of our sensitivities in designing. And it has been the compilation of the course.

FAQ

Related Courses

Invite & Earn

X
Signup to start sharing your link
Signup

Available Coupon

X