Most of today Ethical Hacking and Penetration testing courses are focusing on how to compromise computers with Windows and Linux platform while right now most peoples are keeping all their critical data (Emails, Contacts, SMS, Personnel files) on Smart phones and tablet that use different platform like Android and doesn't have the same layers of security like PC's and accordingly peoples may think that their data is safe because they have an Anti Virus and Firewall on their computers while the true is that all the data is replicated on their smart phone or another android devices that is very easy to compromise.
This course consist of three different parts,first parts is about Kali Linux which will be used as Hacking platform, second part is about how to hack Android devices and third part is how to hack using Android devices, finally i would like to clarify that the course will be updated frequently with all new Android vulnerabilities and the exploitation techniques.
real material and real explanation, with real tutoring
- Mahamed Dulin
Thank you for a very informative and eye-opening course! Each lecture is given at a nice pace and easy to follow along with. I enjoyed the level of detail given to both attacks and counter measures. I am looking forward to the final lecture on hiding an IP address for a remote attack.
- Jim Del Rio
This course is very interesting to know about security awareness and when they use Andori devices in the network
- Oumarou BOUBACAR NAMALKA
This course is intersting about android hacking, But please add more videos about how we can use other exploits on Exploit-db? such as Pdf Attack and other. thank you very much.
Truly a real life scenario and step by step course! Love it!
- Atausch P
Cyber Security Consultant / Certified Instructor with more than 20 years of experience implementing and managing Cyber Security project such as:
3 Books published
14 best sellers online courses