Mobile Applications Security Courses | Mobile Applications Security Courses in India | |
Lecture 40
Duration 40 Hrs
Skill Level All
Language English
Assessments Online
With the advent of smartphone explosion, most web applications are diversifying to mobile apps. With the increase in services available for mobile apps, mobile apps become an easy attack front for the attackers. Not only can they be used to access customer data, they can also lead to major data breaches from the servers. In this course all common attacks like Insecure data storage, Insecure communication, authentication bypass etc are covered. This course also covers standards like OWASP and SANS.
Takeaways for the students.

Industry recognised certification as "Information Security Certified Professional."
Training under Kratikal Certified Instructor.
Live security testiong (VA)
projects under kratikal.
Course Material, Video, Lectures
and DVD toolkit.
Regular assessments and
skill checks.
Lifetime access to E-learning
  • Cyber Crimes
  • Statistics of Cyber Crime
  • Cyber Laws
  • Case Studies
  • Recent Cyber Crimes around the world
  • How to Report Cyber Crimes
  • Recent Initiatives in India
  • Security Compliances
  • Introduction
  • Definition of terms
  • Objectives of Cryptography
  • Types of Attacks
  • Introduction to Cryptosystems
  • Encryption
  • Modern Ciphers
  • Cost Benefit Approach
  • Introduction to Symmetric key cryptography
  • Types of Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Hashing
  • Cryptographic Protocols
  • Cryptographic Tools
  • Cryptographic Attacks
  • Introduction
  • Objectives of Spoofing
  • Types of Spoofing
  • Impact of spoofing
  • Legal issues
  • Counter Measures
  • Introduction
  • Interaction with an Android Device
  • Android Network Analysis
  • Android APK Reverse Engineering
  • Android Application Pen-testing
  • Vulnerabilities in Android
  • Rooting Android Devices
  • Android Hacking tools
  • Android Security Tool DroidSheep
  • IOS Hacking Devices
  • Hacking Windows Phone OS
  • Factors that make companies
  • Warning signs of attack
  • Phases in a social engineering attack
  • Common targets of social engineering
  • Human Based Social engineering
  • Computer based social engineering
  • Mobile based social engineering
  • Insider Attack
  • Preventing Insider threats
  • Masquerading on Social Networking
  • Identity Theft
  • Social engineering Countermeasures
  • How to detect phishing emails
  • Identity Theft Countermeasures
Still have doubts? Talk to our counsellor
Contact Us
Accredited By

Alumnus of Kratikal working at