Android Application Security Testing Essential Training Diva



Last updated 12/2016
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 113.87 MB | Duration: 0h 52m
Pentesting Android Apps – DIVA


What you’ll learn
Over 14 lectures and 2 hour of content
Learn android vulnerabilities
Learn how to perform android pentesting
owasp top 10 vulnerabilities mobile
Requirements
Basic IT Skills
Working Internet Connection
Description
Android Application Security Testing Essential Training a highly practical and hands on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, You will learn various topics such as , Android security model, Android Application Pentesting and Exploitation, Reversing Android applications, static and dynamic analysis of android sql ,input validation, access control, hardcoding issues and a bunch more. etc. After finishing this course you will be able to perform a Penetration test on a given Android device and its applications ,DIVA is Damn Insecure and Vulnerable Application created by Aseem Jakhar, Payatu Labs. It contains various vulnerabilities including flaws in input validation, access control, hardcoding issues and a bunch more. This video course guides the viewer on how to analyse the vulnerabilities in DIVA and possibly exploit them. Using the skills learnt in the DIVA videos along with the Android for Pentesters training, you can apply the same knowledge to the real world application and identify security vulnerabilities in Android apps. you can take a deep dive into each category, examining real-world examples that demonstrate how companies and consumers alike are affected, and learn techniques that can help you prevent these types of attacks.
Overview
Section 1: Section 1: Getting Started and Lab Setup
Lecture 1 Introduction
Lecture 2 Lab Setup 1
Section 2: Section 2
Lecture 3 Section 2: Insecure Logging
Section 3: Section 3
Lecture 4 Section 3: Hardcoding Vulnerabilities
Section 4: Section 4
Lecture 5 Section 4: Insecure Data Storage 1
Section 5: Section 5
Lecture 6 Section 5: Insecure Data Storage 2
Section 6: Section 6
Lecture 7 Section 6: Insecure Data Storage 3
Section 7: Section 7
Lecture 8 Section 7: Insecure Data Storage 4
Section 8: Section 8
Lecture 9 Input Validation Vulnerability 1
Section 9: Section 9
Lecture 10 Section 9: Input Validation Vulnerability 2
Section 10: Section 10
Lecture 11 Section 10: Access Control Vulnerability 1
Section 11: Section 11
Lecture 12 Section 11: Access Control Vulnerability 2
Section 12: Section 12
Lecture 13 Hardcoding Vulnerabilities
Section 13: Section 13
Lecture 14 Section 13: Input Validation Vulnerability 3
Security testers,Students,Web Developer,IT Security Professionals,Hacker,Anyone Who Interested In Securing Web Security
Homepage

https://www.udemy.com/course/android-application-security-testing-essential-training/

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me


DOWNLOAD FROM RAPIDGATOR.NET

DOWNLOAD FROM NITROFLARE.COM

DOWNLOAD FROM UPLOADGIG.COM

Links are Interchangeable – No Password – Single Extraction