وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

The Complete Mobile Ethical Hacking Course

سرفصل های دوره

Learn how hackers attack phones, mobile applications and mobile devices with latest technology and protect yourself!


1 - Introduction
  • 1 - Introduction and Welcome
  • 2 - Before We Start

  • 2 - Lab Setup
  • 3 - Introduction to Lab Setup
  • 4 - What is Virtual Machine
  • 5 - Installing Virtualbox for Windows Users
  • 6 - Installing Virtualbox for MAC Users
  • 7 - Kali Linux Download
  • 8 - Kali Linux Download Links.html
  • 9 - Kali Linux Installation
  • 10 - Problem Solving Windows
  • 11 - Solving Kali Installation Problems Iso Installation
  • 12 - Problem Solving MAC
  • 13 - Solutions to Common Problems and Links.html
  • 14 - Taking Snapshots
  • 15 - Kali Linux Overview
  • 16 - Navigation
  • 17 - Moving Stuff
  • 18 - Privilege and Permissions
  • 19 - Linux Folders
  • 20 - Package Managers
  • 21 - Nano
  • 22 - Changing Passwords

  • 3 - Mobile Backdoors
  • 23 - Mobile Backdoors Introduction
  • 24 - Backdoor Android vs iOS
  • 25 - What is Payload
  • 26 - IP Address
  • 27 - Tunnel Services
  • 28 - APK Process
  • 29 - Listening for Connections
  • 30 - Signing Process
  • 30 - signature.txt
  • 31 - Hacking Phone

  • 4 - Android Studio Fundamentals
  • 32 - Introduction to Android Studio Fundamentals
  • 33 - JDK Installation Windows
  • 34 - JDK Installation MAC
  • 35 - Android Studio Installation Windows
  • 36 - Android Studio Installation MAC
  • 37 - SDK Installation
  • 38 - Creating First Project
  • 39 - Android Studio Overview
  • 40 - User Interface
  • 41 - Connecting Views with Code
  • 42 - Changing Image
  • 43 - Opening Title Bar

  • 5 - Java Fundamentals
  • 44 - Introduction to Java Fundamentals
  • 45 - Java Basics
  • 46 - Variables
  • 47 - Data Types Continued
  • 48 - Variable or Constant
  • 49 - Arrays
  • 50 - Array List
  • 51 - Set
  • 52 - HashMap
  • 53 - Conditions
  • 54 - If Statements
  • 55 - Switch
  • 56 - For Loop
  • 57 - For Loop Continued
  • 58 - While Loop
  • 59 - Activity Lifecycle
  • 60 - Methods
  • 61 - Scope
  • 62 - Classes
  • 63 - Constructor
  • 64 - Access Levels
  • 65 - Getter and Setter
  • 66 - Java Fundamentals GitHub Codes.html
  • 67 - Calculator User Interface
  • 68 - Calculator Constraints
  • 69 - Connecting Views
  • 70 - Calculator Codes
  • 71 - Safe Calculator
  • 72 - Calculator GitHub Codes.html
  • 73 - Android Development in 10 Minutes

  • 6 - iOS Development Fundamentals
  • 74 - Introduction to iOS Development Fundamentals
  • 75 - Swift on Windows
  • 76 - MacBook Setup
  • 77 - Creating First Project
  • 78 - Xcode Overview
  • 79 - Simulator
  • 80 - User Interface
  • 81 - Connecting Views
  • 82 - Changing Image with Code
  • 83 - Downloading Projects
  • 84 - Options for Writing
  • 85 - Variables and Constants
  • 86 - Variable Types
  • 87 - Predefining Types
  • 88 - Arrays
  • 89 - Set
  • 90 - Dictionaries
  • 91 - While Loop
  • 92 - For Loop
  • 93 - If Controls
  • 94 - Functions
  • 95 - Optionals
  • 96 - Worst Calculator Assignment
  • 97 - Calculator Design
  • 98 - Calculator Codes
  • 99 - Safety and Scope
  • 100 - What is OOP
  • 101 - Initiliazer
  • 102 - What is Enum
  • 103 - What is Inheritance
  • 104 - Access Levels
  • 105 - GitHub Links.html

  • 7 - Rooting & JailBreaking
  • 106 - Introduction to Rooting & JailBreaking
  • 107 - What is Rooting & Jail Breaking
  • 108 - Jail Break Tools
  • 109 - Jail Break Process
  • 110 - iPad SSH
  • 111 - Android Installing APKs
  • 112 - Rooting Android

  • 8 - Reverse Engineering Android
  • 113 - Android Reverse Engineering Introduction
  • 114 - Reverse Engineering Tools
  • 115 - Kali Reverse Engineering Tools
  • 116 - MAC Reverse Engineering Tools
  • 117 - Hello World App
  • 118 - Creating APK
  • 119 - Dalvik Bytecode
  • 120 - App Manipulation
  • 120 - Dalvik Byte Code Cheat Sheet.txt
  • 121 - Signing
  • 121 - signature.txt
  • 122 - Jadx Usage
  • 123 - ProGuard Usage
  • 124 - Obfuscated APK Decryption
  • 125 - Game Hacking Practice
  • 125 - Word Game Link.txt
  • 126 - Word Game Codes
  • 127 - Reverse Engineering Advanced
  • 128 - Method Manipulation
  • 129 - Hacking the Game
  • 130 - GitHub Links.html

  • 9 - Reverse Engineering iOS
  • 131 - iOS Reverse Engineering Introduction
  • 132 - Jail Break Detection
  • 132 - Jail Break Detection.txt
  • 132 - Jail Break Detection Swift.txt
  • 133 - Assembly
  • 134 - Hexademical
  • 135 - Assembly Hints
  • 136 - Cycript
  • 136 - Cycript Tricks.txt
  • 137 - Manipulating App in Runtime
  • 138 - Swift Challanges
  • 139 - GitHub Links.html

  • 10 - Cloud Hacking Firebase Security
  • 140 - Cloud Security Introduction
  • 141 - Firebase Security Practice
  • 141 - Secure Tweet GitHub Link.txt
  • 142 - What is Firebase
  • 143 - Firebase Integration
  • 144 - Dependency Work
  • 145 - Preparing Files
  • 146 - XML Work
  • 147 - Java Files
  • 148 - Testing
  • 149 - How SecureTweet Works
  • 150 - Reverse Engineering
  • 151 - Getting Project ID
  • 152 - Getting Collection Name
  • 153 - Proxy Operations
  • 154 - Emulator Proxy
  • 155 - SSL Certificates
  • 156 - APK Manipulation
  • 157 - HTTPS Listening
  • 158 - Hacking Firestore
  • 159 - Safe Database Rules
  • 160 - Firestore Security Rules In Depth
  • 161 - GitHub Links.html

  • 11 - CTF Banking App Hacking
  • 162 - CTF Introduction
  • 163 - CTF GitHub Link.txt
  • 163 - CTF Practice
  • 164 - Installing Genymotion
  • 165 - Genymotion Settings
  • 166 - Server Setup Windows
  • 167 - Server Setup MAC
  • 168 - Running App
  • 169 - Bypassing Root Detection
  • 170 - Activity Manipulation
  • 171 - Simple Admin Flaw
  • 172 - Admin Vulnerability
  • 173 - Cryptology Hacking
  • 174 - Hacking Content Providers
  • 175 - GitHub Links.html

  • 12 - InNetwork Attacks for Mobile Devices
  • 176 - InNetwork Attacks Introduction
  • 177 - What is MITM
  • 178 - USB WiFi Card Options
  • 179 - Kali Linux WiFi Card List.html
  • 180 - Connecting USB WiFi Card
  • 181 - Solutions to Common Connection Problems.html
  • 182 - Bettercap Installation
  • 183 - ARP Attack
  • 184 - HTTPS Importance
  • 185 - Currency Converter GitHub Links.html

  • 13 - API Pentesting
  • 186 - What is API Security
  • 187 - DigitalOcean Free Credit Link.html
  • 188 - Creating Server
  • 189 - Installing API in Server
  • 190 - Burpsuite Settings
  • 191 - Postman
  • 192 - Broken Object Authorization
  • 193 - Broken Authentication
  • 194 - Excessive Data Exposure
  • 195 - One Time Password Bypass
  • 196 - Broken Function Level Authentication
  • 197 - Mass Assignment
  • 198 - Cors
  • 199 - SQLi
  • 199 - sqli.txt
  • 200 - Improper Asset Management
  • 201 - Closing

  • 14 - Closing
  • 202 - Further Tools & Reading Materials.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 15390
    حجم: 3513 مگابایت
    مدت زمان: 1606 دقیقه
    تاریخ انتشار: 4 تیر 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید