Android Application Security Testing Essential Training Diva

Last updated 12/2016
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 113.87 MB | Duration: 0h 52m
Pentesting Android Apps – DIVA

What you’ll learn
Over 14 lectures and 2 hour of content
Learn android vulnerabilities
Learn how to perform android pentesting
owasp top 10 vulnerabilities mobile
Basic IT Skills
Working Internet Connection
Android Application Security Testing Essential Training a highly practical and hands on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, You will learn various topics such as , Android security model, Android Application Pentesting and Exploitation, Reversing Android applications, static and dynamic analysis of android sql ,input validation, access control, hardcoding issues and a bunch more. etc. After finishing this course you will be able to perform a Penetration test on a given Android device and its applications ,DIVA is Damn Insecure and Vulnerable Application created by Aseem Jakhar, Payatu Labs. It contains various vulnerabilities including flaws in input validation, access control, hardcoding issues and a bunch more. This video course guides the viewer on how to analyse the vulnerabilities in DIVA and possibly exploit them. Using the skills learnt in the DIVA videos along with the Android for Pentesters training, you can apply the same knowledge to the real world application and identify security vulnerabilities in Android apps. you can take a deep dive into each category, examining real-world examples that demonstrate how companies and consumers alike are affected, and learn techniques that can help you prevent these types of attacks.
Section 1: Section 1: Getting Started and Lab Setup
Lecture 1 Introduction
Lecture 2 Lab Setup 1
Section 2: Section 2
Lecture 3 Section 2: Insecure Logging
Section 3: Section 3
Lecture 4 Section 3: Hardcoding Vulnerabilities
Section 4: Section 4
Lecture 5 Section 4: Insecure Data Storage 1
Section 5: Section 5
Lecture 6 Section 5: Insecure Data Storage 2
Section 6: Section 6
Lecture 7 Section 6: Insecure Data Storage 3
Section 7: Section 7
Lecture 8 Section 7: Insecure Data Storage 4
Section 8: Section 8
Lecture 9 Input Validation Vulnerability 1
Section 9: Section 9
Lecture 10 Section 9: Input Validation Vulnerability 2
Section 10: Section 10
Lecture 11 Section 10: Access Control Vulnerability 1
Section 11: Section 11
Lecture 12 Section 11: Access Control Vulnerability 2
Section 12: Section 12
Lecture 13 Hardcoding Vulnerabilities
Section 13: Section 13
Lecture 14 Section 13: Input Validation Vulnerability 3
Security testers,Students,Web Developer,IT Security Professionals,Hacker,Anyone Who Interested In Securing Web Security

Please Download Link Hight Speed | Support Download Unlimited Speed

Links are Interchangeable – No Password – Single Extraction

Direct Link Download

Leave a Reply

Your email address will not be published.