0845 450 6120

Certified Mobile Application Hacking

This 3 day mobile application hacking training course is designed to provide you with the fundamentals of mobile application security, detailing the most common vulnerabilities and how to identify them.

Focussing on the prevalent mobile platforms, Android and iOS, you will have access to vulnerable mobile applications using devices and emulators to assess their security through a series of practical hands-on exercises. The techniques gained throughout this course will enable you to understand whether the sensitive information stored on mobile devices is sufficiently protected and what the risk and exposure is if an attacker was able to get his hands on the mobile device.


  • Develop secure mobile applications
  • Gain an understanding of the significance of data stored on every day mobile device
  • Develop skills that allow you to undertake a greater variety of work
  • Avoid security vulnerabilities
  • Gain an industry recognised qualification.

Target Audience

  • App Developers
  • IT security officers
  • Penetration testers
  • Ethical hackers
  • Network and Systems administrators
  • Auditors

We don't currently have any courses listed for Certified Mobile Application Hacking, would you like to view all courses for Information & Cyber Security?

Learning Objectives

Upon completion of the course, you will:

  • have learnt the content of OWASP's Mobile Top 10 vulnerabilities list
  • understand where issues might appear in a mobile application
  • have gained knowledge of the most popular security vulnerabilities identified in iOS and Android platforms
  • understand the significance of data stored on every day mobile devices
  • have learnt to retrieve class methods by reverse engineering iOS applications
  • gained the ability and confidence to reverse engineer Android applications to obtain source code
  • have learnt the fundamental vulnerabilities found on mobile applications, including static and runtime analysis of the applications, insecure data storage and binary patching.


Delegates should have knowledge or a basic understanding of:

  • How the iOS and Android platform and devices work
  • HTTP protocol
  • Programming
  • Windows and Linux command Line
  • Java and Objective-C languages

Course Content


iOS Security

  • Secure Boot Chain
  • Sandboxing
  • File security

Android Security

  • Zygote
  • Sandboxing
  • File Access

Application types

  • Native
  • Web based
  • Hybrid (Both)


Data in Transit

  • Setting up a proxy (Both)
  • Installing certificates
  • Certificate Pinning (Both)
  • SQL injection (Both)
  • XSS (Both)
  • URL Schemes
  • Content Providers (Android)
  • Javascript Bridges (Android)

Data at Rest

  • SQLite files (Both)
  • Plist files
  • NSUserDefaults
  • Core Data
  • Keychain
  • Cookies
  • Data location (Android)

Static Analysis

  • Decrypting Applications
  • Position Independent Executable (PIE) Flag
  • Class Dumping
  • Binary patching
  • Automated Tools (Both)
  • Manifest file examination (Android)
  • Reverse Engineering (Android)
  • Smali code syntax (Android)
  • Java decompilation (Android)
  • Hardcoded sensitive information (Android)
  • Application backups (Android)
  • Broken Cryptography (Android)

Dynamic Analysis / Runtime Analysis

  • Runtime Patching (Both)
  • Runtime Manipulation
  • Automated Tools
  • Activity manager (Android)
  • Reflection (Android)

Side Channel Attacks

  • Screenshots
  • Cookies (Android)
  • Cache (Both)

Known attacks

  • Known attacks
  • Cache
One Month
Two Months
Three Months
More than Three Months
PRINCE2 Foundation & Practitioner
MSP Foundation & Practitioner
APMP Certificate
ITIL Foundation
Scrum in One Day
Certified ScrumMaster
ISTQB Software Test Foundation
Microsoft Project
BCS Business Analysis Practice
Other - Please Specify Below

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include