Security Vulnerabilities & Testing

Android Studio 1.2.0
  • 16 Videos | 1h 27m 24s
  • Includes Assessment
  • Earns a Badge
Likes 16 Likes 16
Learn how to secure Android devices and applications for the enterprise environment, including planning penetration testing and performing forensics and hacking techniques on Android applications.

WHAT YOU WILL LEARN

  • describe Android device penetration testing methodology
    describe main steps for carrying out a generic penetration test on Android OS and devices
    carry out a network scan using Nmap
    install and use BusyBox on an Android device to examine its network port and socket activity
    analyze network traffic on an Android device using Wireshark
    use Burp suite to intercept traffic for a browser application on a virtual Android device
    describe the Android app development best practices against which penetration tests should be carried out
    analyze Android device mount points
  • examine some file systems that typically exist on an Android device
    examine Android device directory structure
    describe storage options for Android application data
    explore the contents of the application data directory for default Android e-mail application
    identify the advantages and pitfalls of enabling root access on an Android device
    create a system image for an Android device
    retrieve and access an Android application database
    capture and analyze traffic from a sample application, retrieve its database, and view its database contents

IN THIS COURSE

  • Playable
    1. 
    Overview on Penetration Testing Methodology
    3m 19s
    UP NEXT
  • Playable
    2. 
    General Steps for Carrying out a Penetration Test
    2m 41s
  • Locked
    3. 
    Scanning a Network Using Nmap
    5m 22s
  • Locked
    4. 
    Examining Network Activity with BusyBox
    9m 12s
  • Locked
    5. 
    Analyzing Network Traffic Using Wireshark
    6m 19s
  • Locked
    6. 
    Intercepting Browser Application Traffic
    5m 48s
  • Locked
    7. 
    Penetration Testing Best Practices
    3m 18s
  • Locked
    8. 
    Analyzing Android Device Mount Points
    2m 22s
  • Locked
    9. 
    Examining Android File Systems
    3m 4s
  • Locked
    10. 
    Examining Android Device Directory Structure
    6m 7s
  • Locked
    11. 
    Overview of Storage Options for Application Data
    3m 48s
  • Locked
    12. 
    Exploring an Application's Data Directory
    4m 19s
  • Locked
    13. 
    Working with Root Access
    4m 52s
  • Locked
    14. 
    Creating an Android Device Image
    6m 1s
  • Locked
    15. 
    Accessing Application Databases
    5m 29s
  • Locked
    16. 
    Exercise: Analyzing Application Traffic and Data
    8m 53s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 24 Likes 24  
Likes 102 Likes 102  
Likes 132 Likes 132