Mobile Penetration Testing

$ 1.000/0.01454220

This course will cover both Android and iOS operating systems and will address all core-level binary vulnerabilities and application-level vulnerabilities, some operating system-level vulnerabilities such as Use After Free that occur in different drivers. The data will be reviewed and evaluated, as well as how to operate and bypass the operating system defense mechanisms that are implemented on ARM processors. Other vulnerabilities that occur at the application level will also be addressed.

View full Syllabus

Out of stock

How to Access: Online
Access Time: Unlimited
Course Level: Beginner + Intermediate + Advanced
Category: Offensive Security


  • Windows 10 and 11 are preferred.
  • Windows 7 and 8.1 will also work.
  • Dual-core processor (2+ GHz).
  • 4+ GB of RAM.
  • Chrome, Firefox or Microsoft Edge will also work.


  • OS X El Capitan
  • Dual-core 1.2 GHz Intel Core M processor.
  • 4+ GB of RAM.
  • Chrome, Firefox or Safari will also work.


  • Ubuntu +16 – Kali Linux +2020
  • Dual-core 1.2 GHz Intel Core M processor.
  • 4+ GB of RAM.
  • Chrome, Firefox or Safari will also work.

Online Lab Exercises

  • Access to the online laboratory can be achieved with any browser and any operating system, and there are no obstacles in the laboratory section.

Access: Unlimited access from registration to forever.100%


Language: Training courses are designed in Persian and English.100%


Pace: Learning is guided and available anytime from 24 hours.100%


Virtual lab access: access is granted until practical challenges are solved.100%


Downloads: If you use scripts and similar things, they will be available for download.100%


Learning environment: access to LMS will be based on desktop, mobile and tablet browsers.100%


Guided Videos: A complete tutorial video is provided for each topic.100%



There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Dedicated Laboratory

Awarding a Valid Certificate

Unlimited Access

Course Quality

  • In cybersecurity training courses, all dimensions and aspects of a subject are not addressed, and this problem causes the operational capacity of students to decrease significantly.
  • In the offensive security courses designed under the supervision of Anon’s research team, a content strategy is defined, based on which every topic raised in the educational syllabus is studied and taught from all technical aspects.
  • The content strategy in penetration testing courses is as follows:
  1. The cause of the vulnerability event
  2. How to detect vulnerability as a black box
  3. How to discover vulnerability as a white box
  4. How to obfuscate and bypass defense mechanisms
  5. How to exploit and design the exploitation chain

Learning Management System

  • The online education management system will have the task of intelligent and browser-based guidance of users, as well as the establishment of theoretical and practical tests.
  • Another task of this system will be to record the duration of courses and completion of course topics, so that it can finally display accurate statistical information to the companies applying for human resources and the users themselves.
  • In this system, there are two contents of the course, the first is the educational videos of each lesson and their topics, the second is an online booklet, which is presented on the page of each lesson and all the points of that topic, and users can read them in the LMS system.
  • It should be noted that the videos and texts of the training course are only available through the LMS system and cannot be downloaded or copied, of course, course users will always have access to the training system for a lifetime.

Online Laboratory

  • Another feature of this course is to have an online operational laboratory that is designed for each of the Syllabus topics, at least three to five different scenarios and with the approach of the real event environment of that topic.
  • Access to each of the lab sections is such that any lesson that is opened to users according to the LMS educational path, will be available to users according to that lesson’s online laboratory section, and as long as the user has operational challenges If you don’t do it, the next lesson won’t open.
  • The duration of access to each part of the online laboratory is unlimited, of course, until the user passes the practical challenge. If the challenge is passed, that challenge will be removed from the user’s reach and the next challenges will be opened.
  • An information counter has been placed in the online laboratory to track all the events and academic trends of the users and show them to the users themselves, this information will also be used in order to rank the users.

Operational Tools

  • In the training courses of the Unk9vvN research team, users are given two tools installer that prepare the Kali Linux and Windows Server operating systems, which are aimed at performing operational commands in the real world, also based on the studies conducted in the courses.
  • It is the first program for Windows Server 2022 that will include all the tools of the offensive security fields, tools that will be available with just one click, in this tools’ installer, all the tools based on the Windows operating system have been tried in a useful way. To be collected
  • The second virtual machine is the Kali Linux operating system, which has been designed and provided to users in a personalized way with more comprehensive and complete tools than before.
  • The reason for providing these two operational tools installer is that users can have a complete and comprehensive environment for their operational needs without worrying and increase the speed of their tests.

Cheat Sheet and Checklist

  • For each training course, a cheat sheet is provided, which is designed as a complete, dedicated manual and is provided to users, this manual is aimed at facilitating the implementation of test operations that users should use in the operational part, these manuals It will include the introduction of quality tools and how to use them for all kinds of tests.
  • In addition to the cheat sheet, a comprehensive and complete checklist is provided so that users, after learning the lessons presented in the course, based on that checklist and cheat sheet, can perform security assessments and specifically discover weak and vulnerable points.

Association with Teachers

  • Course users can be in direct contact with professors on two communication platforms, the first is the Discord program for weekly voice question and answer sessions, the second is the Telegram program and a semi-private group for raising questions and specialized discussions with professors and course designers.
  • The training courses of the Anon research team are not based on one person and are designed by a team, therefore, in relation to any technical problems or questions, users can communicate with the designers and professors of the course on the mentioned platforms on a daily basis. And raise their issues.

Domestic and Foreign Jobs

  • Offensive security specialties, especially penetration testing, are always offered alongside defensive security services, and experts in this field can provide great help to a professional cybersecurity solution. Therefore, penetration testing jobs are always needed both inside Iran and outside Iran, and they offer appropriate salaries.
  • To check penetration testing jobs in Iran, you can refer to and, and also for jobs in this field outside of Iran, you can refer to and websites. Evaluate the careers of this field.


  • Red team members
  • Vulnerability assessment experts
  • Network penetration testers
  • Security consultants
  • Developers
  • IT managers
  • System Architects
  • Software students
  1. Basics of Network
  2. Basics of Linux
  3. Basics of JSON and XML
  4. Basics of Java
  5. Basics of Kotlin
  6. Basics of Swift
  7. Basics of Smali
  8. Professional Python


  1. Mobile App Taxonomy
  2. Mobile App Security Testing

General Vulnerabilities

  1. Mobile App Authentication Architectures
  2. Testing Network Communication
  3. Cryptography in Mobile Apps
  4. Testing Code Quality
  5. Tampering and Reverse Engineering

Android Vulnerabilities

  1. Platform Overview
  2. Android Basic Security Testing
  3. Data Storage on Android
  4. Android Cryptographic APIs
  5. Local Authentication on Android
  6. Android Network APIs
  7. Android Platform APIs
  8. Code Quality and Build Settings for Android Apps
  9. Tampering and Reverse Engineering on Android
  10. Android Anti-Reversing Defenses

iOS Vulnerabilities

  1. Platform Overview
  2. iOS Basic Security Testing
  3. Data Storage on iOS
  4. iOS Cryptographic APIs
  5. Local Authentication on iOS
  6. iOS Network APIs
  7. iOS Platform APIs
  8. Code Quality and Build Settings for iOS Apps
  9. Tampering and Reverse Engineering on iOS
  10. iOS Anti-Reversing Defenses
  • You can do an in-depth analysis of open source web applications codes without compiling.
  • You can detect logical vulnerabilities that many enterprise scanners cannot detect.
  • You can participate in programs called Bug Bounty and discover Critical level vulnerabilities.
  • You can provide web penetration testing services at the organizational and public levels.

Related Courses

Invite & Earn

Signup to start sharing your link
background banner image
loading gif

Available Coupon