Mobile Penetration Testing of Android Applications

What you’ll learn

  • Learn to audit or perform penetration tests agains Android applications
  • Learn tools and techniques
  • Perform real world attacks on Android Devices and Apps
  • Perform Certification Pinning bypass for most of Android Apps
  • Explore OWASP Top Ten Mobile and Web most common vulnerabilities
  • Android Malware Analysis

Senior Information Security Consultant

– I work in the Internet security team, focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

– Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking).

– Make recommendations on security weaknesses and report on activities and findings. 

– Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated) 

– Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment

– Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.)

– Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures 

– Assist with the development of remediation services for identified findings 

– Customize, operate, audit, and maintain security related tools and applications

IT Trainer 

– CEH, ECSA, CHFI, ECIH, ICS-SCADA Cybersecurity from EC-Council

– Cisco CCNA, CCNA Security, Linux Essentials

Certifications

– OSWE (Offensive Security Web Expert)

– CREST Registered Penetration Tester (CRT)

– ECIH (EC-Council Incident Handling)

– Ec-Council ICS-SCADA Cybersecurity

– OSCE (Offensive Security Certified Expert)

– OSWP (Offensive Security Wireless Professional)

– OSCP (Offensive Security Certified Professional)

– CHFI (Computer Hacking Forensic Investigator)

– ISO 270001 Lead Auditor

– ECSA (EC-Council Security Analyst)

– CEH (Certified Ethical Hacker)

– CCNA and CCNA Security

– CCNP Routing and CCNP Switching

– Advanced Linux&InfoSEC

– VMWare vSphere Install, Configure, Manage

– Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.

Leave a Comment