Krafty Internet Marketing Forum
SANS SEC575: Mobile Device Security and Ethical Hacking 2017 - Printable Version

+- Krafty Internet Marketing Forum (https://kraftymarketingprofits.com/internetmarketingforum)
+-- Forum: UDEMY (https://kraftymarketingprofits.com/internetmarketingforum/Forum-udemy--30)
+--- Forum: Udemy Courses! (https://kraftymarketingprofits.com/internetmarketingforum/Forum-udemy-courses--31)
+--- Thread: SANS SEC575: Mobile Device Security and Ethical Hacking 2017 (/Thread-sans-sec575-mobile-device-security-and-ethical-hacking-2017--6451)



SANS SEC575: Mobile Device Security and Ethical Hacking 2017 - fssuploader - 12-03-2017

[Image: C-6hkYfXkAAi2bH-768x513.jpg]

SANS SEC575: Mobile Device Security and Ethical Hacking 2017

File Size: 10 GB




Imagine an attack surface spread throughout your organization, in the hands of every user, which moves from place to place regularly, stores highly sensitive and critical data, and sports numerous different wireless technologies all ripe for attack. You have it today: mobile devices. These devices are the biggest attack surface in most organizations today, yet these same organizations often don't have the skills needed to assess them.

NOW COVERING ANDROID NOUGAT, iOS 10, APPLE WATCH AND ANDROID WEAR

Mobile devices are no longer a convenience technology: they are an essential tool carried or worn by users worldwide, often displacing conventional computers for everyday enterprise data needs. You can see this trend in corporations, hospitals, banks, schools, and retail stores throughout the world. Users rely on mobile devices more today than ever before - we know it, and the bad guys do too.

LEARN HOW TO PEN TEST THE BIGGEST ATTACK SURFACE IN YOUR ENTIRE ORGANIZATION

This course is designed to give you the skills you need to understand the security strengths and weaknesses in Apple iOS, Android, and wearable devices including Apple Watch and Android Wear. With these skills, you will evaluate the security weaknesses of built-in and third party applications. You'll learn how to bypass platform encryption, and how to manipulate Android apps to circumvent obfuscation techniques. You'll leverage automated and manual mobile application analysis tools to identify deficiencies in mobile app network traffic, file system storage, and inter-app communication channels. You'll safely work with mobile malware samples to understand the data exposure and access threats affecting Android and iOS devices, and you'll exploit lost or stolen devices to harvest sensitive mobile application data.

TAKE A DEEP DIVE INTO EVALUATING MOBILE APPS, OPERATING SYSTEMS, AND THEIR ASSOCIATED INFRASTRUCTURES

Understanding and identifying vulnerabilities and threats to mobile devices is a valuable skill, but it must be paired with the ability to communicate the associated risks. Throughout the course, you'll review the ways in which we can effectively communicate threats to key stakeholders. You'll leverage tools including Mobile App Report Cards to characterize threats for management and decision makers, while identifying sample code and libraries that developers can use to address risks for in-house applications as well.

YOUR MOBILE DEVICES ARE GOING TO COME UNDER ATTACK - HELP YOUR ORGANIZATION PREPARE FOR THE ONSLAUGHT!

Through the use of your new skills, you'll apply a mobile device deployment penetration test in a step-by-step fashion. Starting with gaining access to wireless networks to implement man-in-the-middle attacks and finishing with mobile device exploits and data harvesting, you'll examine each step in conducting such a test with hands-on exercises, detailed instructions, and tips and tricks learned from hundreds of successful penetration tests. By building these skills, you'll return to work prepared to conduct your own test, or better informed on what to look for and how to review an outsourced penetration test.

Mobile device deployments introduce new threats to organizations including advanced malware, data leakage, and the disclosure of enterprise secrets, intellectual property, and personally identifiable information assets to attackers. Further complicating matters, there simply are not enough people with the security skills needed to identify and manage secure mobile phone and tablet deployments. By completing this course, you'll be able to differentiate yourself as having prepared to evaluate the security of mobile devices, to effectively assess and identify flaws in mobile applications, and to conduct a mobile device penetration test - all critical skills to protect and defend mobile device deployments.

Course Syllabus

SEC575.1: Device Architecture and Common Mobile Threats

SEC575.2: Mobile Platform Access and Application Analysis

SEC575.3: Mobile Application Reverse Engineering

SEC575.4: Penetration Testing Mobile Devices, Part 1

SEC575.5: Penetration Testing Mobile Devices, Part 2

SEC575.6: Capture the Flag

[Image: SANS-OnDemand_2_3_s.jpg]







Code:
Download Via UploadGiG.com
https://uploadgig.com/file/download/5170ddb4f7A95436/Mobile Device Security.part01.rar
https://uploadgig.com/file/download/9f2624052bc38611/Mobile Device Security.part02.rar
https://uploadgig.com/file/download/DB2e10df475fba4F/Mobile Device Security.part03.rar
https://uploadgig.com/file/download/fdae76Fe8b1518ac/Mobile Device Security.part04.rar
https://uploadgig.com/file/download/934b7450922EBa20/Mobile Device Security.part05.rar
https://uploadgig.com/file/download/a90cC02edA86F95d/Mobile Device Security.part06.rar
https://uploadgig.com/file/download/946D0b4A183e8ba8/Mobile Device Security.part07.rar
https://uploadgig.com/file/download/686526212af60d17/Mobile Device Security.part08.rar
https://uploadgig.com/file/download/2f1e83dbDee3cf8c/Mobile Device Security.part09.rar
https://uploadgig.com/file/download/1508B9daA1fa9a17/Mobile Device Security.part10.rar
https://uploadgig.com/file/download/85ee3dfD291359e9/Mobile Device Security.part11.rar
https://uploadgig.com/file/download/04Aff79ec0Dc17f0/Mobile Device Security.part12.rar
https://uploadgig.com/file/download/c963acfD06D9e72e/Mobile Device Security.part13.rar
https://uploadgig.com/file/download/8684dbF4c3e396b6/Mobile Device Security.part14.rar
https://uploadgig.com/file/download/33B127C20a9299C7/Mobile Device Security.part15.rar

Download Via NitroFlare.com
http://nitroflare.com/view/295923A1A21EFE9/Mobile_Device_Security.part01.rar

http://nitroflare.com/view/EA687A2D3CDB110/Mobile_Device_Security.part02.rar

http://nitroflare.com/view/D2FCE0CD0BF1D73/Mobile_Device_Security.part03.rar

http://nitroflare.com/view/5ADBBF22751C911/Mobile_Device_Security.part04.rar

http://nitroflare.com/view/36061D2305F77CB/Mobile_Device_Security.part05.rar

http://nitroflare.com/view/A97F3A582409C32/Mobile_Device_Security.part06.rar

http://nitroflare.com/view/0D689E6828B4173/Mobile_Device_Security.part07.rar

http://nitroflare.com/view/06DFFD9AEA6DF27/Mobile_Device_Security.part08.rar

http://nitroflare.com/view/25F698F8A5D45CA/Mobile_Device_Security.part09.rar

http://nitroflare.com/view/CA0A5459B1D0192/Mobile_Device_Security.part10.rar

http://nitroflare.com/view/F27DCE26BB92E5E/Mobile_Device_Security.part11.rar

http://nitroflare.com/view/E3D533E211E6C8A/Mobile_Device_Security.part12.rar

http://nitroflare.com/view/D0FA4D63C506F0D/Mobile_Device_Security.part13.rar

http://nitroflare.com/view/234FEE3FEFB1870/Mobile_Device_Security.part14.rar

http://nitroflare.com/view/9966AAA06862499/Mobile_Device_Security.part15.rar