What you’ll learn
- Learn to audit or perform penetration tests agains Android applications
- Learn tools and techniques
- Perform real world attacks on Android Devices and Apps
- Perform Certification Pinning bypass for most of Android Apps
- Explore OWASP Top Ten Mobile and Web most common vulnerabilities
- Android Malware Analysis
Senior Information Security Consultant
– I work in the Internet security team, focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.
– Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking).
– Make recommendations on security weaknesses and report on activities and findings.
– Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated)
– Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment
– Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.)
– Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures
– Assist with the development of remediation services for identified findings
– Customize, operate, audit, and maintain security related tools and applications
IT Trainer
– CEH, ECSA, CHFI, ECIH, ICS-SCADA Cybersecurity from EC-Council
– Cisco CCNA, CCNA Security, Linux Essentials
Certifications
– OSWE (Offensive Security Web Expert)
– CREST Registered Penetration Tester (CRT)
– ECIH (EC-Council Incident Handling)
– Ec-Council ICS-SCADA Cybersecurity
– OSCE (Offensive Security Certified Expert)
– OSWP (Offensive Security Wireless Professional)
– OSCP (Offensive Security Certified Professional)
– CHFI (Computer Hacking Forensic Investigator)
– ISO 270001 Lead Auditor
– ECSA (EC-Council Security Analyst)
– CEH (Certified Ethical Hacker)
– CCNA and CCNA Security
– CCNP Routing and CCNP Switching
– Advanced Linux&InfoSEC
– VMWare vSphere Install, Configure, Manage
– Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.