0345 4506120

Certified Mobile Application Hacking

This 3 day mobile application hacking training course is designed to provide you with the fundamentals of mobile application security, detailing the most common vulnerabilities and how to identify them.

Focussing on the prevalent mobile platforms, Android and iOS, you will have access to vulnerable mobile applications using devices and emulators to assess their security through a series of practical hands-on exercises. The techniques gained throughout this course will enable you to understand whether the sensitive information stored on mobile devices is sufficiently protected and what the risk and exposure is if an attacker was able to get his hands on the mobile device.


  • Develop secure mobile applications
  • Gain an understanding of the significance of data stored on every day mobile device
  • Develop skills that allow you to undertake a greater variety of work
  • Avoid security vulnerabilities
  • Gain an industry recognised qualification.

Target Audience

  • App Developers
  • IT security officers
  • Penetration testers
  • Ethical hackers
  • Network and Systems administrators
  • Auditors

We don't currently have any courses listed for Certified Mobile Application Hacking, would you like to view all courses for Information & Cyber Security?

Learning Objectives

Upon completion of the course, you will:

  • have learnt the content of OWASP's Mobile Top 10 vulnerabilities list
  • understand where issues might appear in a mobile application
  • have gained knowledge of the most popular security vulnerabilities identified in iOS and Android platforms
  • understand the significance of data stored on every day mobile devices
  • have learnt to retrieve class methods by reverse engineering iOS applications
  • gained the ability and confidence to reverse engineer Android applications to obtain source code
  • have learnt the fundamental vulnerabilities found on mobile applications, including static and runtime analysis of the applications, insecure data storage and binary patching.


Delegates should have knowledge or a basic understanding of:

  • How the iOS and Android platform and devices work
  • HTTP protocol
  • Programming
  • Windows and Linux command Line
  • Java and Objective-C languages

Course Content


iOS Security

  • Secure Boot Chain
  • Sandboxing
  • File security

Android Security

  • Zygote
  • Sandboxing
  • File Access

Application types

  • Native
  • Web based
  • Hybrid (Both)


Data in Transit

  • Setting up a proxy (Both)
  • Installing certificates
  • Certificate Pinning (Both)
  • SQL injection (Both)
  • XSS (Both)
  • URL Schemes
  • Content Providers (Android)
  • Javascript Bridges (Android)

Data at Rest

  • SQLite files (Both)
  • Plist files
  • NSUserDefaults
  • Core Data
  • Keychain
  • Cookies
  • Data location (Android)

Static Analysis

  • Decrypting Applications
  • Position Independent Executable (PIE) Flag
  • Class Dumping
  • Binary patching
  • Automated Tools (Both)
  • Manifest file examination (Android)
  • Reverse Engineering (Android)
  • Smali code syntax (Android)
  • Java decompilation (Android)
  • Hardcoded sensitive information (Android)
  • Application backups (Android)
  • Broken Cryptography (Android)

Dynamic Analysis / Runtime Analysis

  • Runtime Patching (Both)
  • Runtime Manipulation
  • Automated Tools
  • Activity manager (Android)
  • Reflection (Android)

Side Channel Attacks

  • Screenshots
  • Cookies (Android)
  • Cache (Both)

Known attacks

  • Known attacks
  • Cache

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include