These methods recognized by EC Council as integral part of those looking to earn their Certified Ethical Hacker certification. The complete CEH BOK can be found at https://www.eccouncil.org/Certification/certified-ethical-hacker/CEH-What-You-Will-Learn.
- Statistic and dynamic analysis of mobile applications
- Testing on Android
- Analyzing Android applications
- Securing iOS applications
- Jailbreaking iOS for command-line access
- Analyzing iOS apps
Skill Level Intermediate
- [Malcolm] The smartphone, and smart devices in general, have, over recent times, dominated the personal and business technology landscape. Few people travel without at least one, if not two, mobile phones, as well as a tablet or two. These devices are used for sensitive business applications, such as on-the-go email and business connectivity, and for sensitive personal applications, such as email, mobile banking, and social media. Unfortunately, the use of mobile devices offers a great opportunity for malicious interference, such as industrial espionage, surveillance and peeping into a person's private activities, and cybercrime.
Making sure that mobile device applications are security tested, is now as important as business systems testing. I'm Malcolm Shore, and I've spent a career helping governments and businesses protect their devices and systems against cyber attacks. In this course, I'll explain the technology used in mobile devices in their applications, the risks that technology exposes us to, and the tools available to test the security of mobile applications. In this course, I'll cover both iOS and Android.
I'll start by explaining the operating system models, and the approach to device and application security. I'll then demonstrate the basic tool sets for application testing. When you finish this course, you'll have a great understanding of how to test mobile applications for security flaws. Now let's get started with mobile devices.