Proactive Mobile Defense

3 Days | Face to Face

Hack your way into a mobile app, discovering the full range of capabilities used by attackers – and the mindset behind their actions.

Attackers are increasingly focusing their efforts on compromising mobile applications. 

With mobile usage having surpassed laptop and desktop, now’s the time to understand: how attackers target mobile apps, the mindset behind their actions, and what you can do to ensure yours are resilient to such threats.

What are the features?

This course uses step-by-step tutorials and practical exercises to give participants working knowledge of mobile hacking on iOS and Android. Understanding the basic principles of vulnerability hunting on-platform, all the way through to advanced exploitation techniques, will equip you to develop secure and resilient mobile apps for your organization or clients.

Business orientated

Practical, exercise-driven, and business-focused.

Up-to-date

Delivered by experienced cyber security professionals, responsible for providing mobile security assessments and security research, and developing assessment tools.

Focused

Focused on the offensive techniques and capabilities of modern attackers, and how to defend against them.

Realistic

Free reign to exploit a realistic web-based mobile application with the latest tooling and techniques.

Educational

Teaches how to introduce security into the development life-cycle in a way you can maintain and scale.

Technical

Covers: secure coding principles, design and source code reviews, and vulnerability assessment tools.

Proven

Developed by the same people behind publications such as The Mobile Application Hacker’s Handbook and tools like Drozer and Needle.

For your consideration

Attendance Course highlights Benefits

Who should attend?

This is a technical course aimed at Android and iOS developers, but it’s suitable for anyone with a technical interest in mobile application security. You don’t require any prior cyber security knowledge to benefit, but working knowledge of both Android and iOS is a must. We also recommend that you’re familiar with the syntax and structure of Android and iOS applications, basic internal and external communications, as well as accessing resources from an application.

  • Get into the head of an attacker with advanced mobile hacking abilities
  • Identify, exploit, and remediate common mobile application security flaws, over and above the OWASP Mobile Top Ten
  • Learn from experts who’ve written books, developed tools, and taken part in global mobile hacking competitions, like Mobile Pwn2Own
  • Get the skills to develop secure mobile applications that withstand advanced attacks, using the most up-to-date and effective secure coding practices
2022_WS_Elements_web_illustrations_Services_Solutions.png

Get started now

1

Fill the form

Fill in the form below to contact us for more details.

2

We'll be in touch

We will reach out to you in a few days to make sure that you've had a smooth start and to help with any questions or concerns.

3

Boost your security with a dedicated partner

We will support you to help you get the most out of WithSecure Training service.

Want to talk in more detail?

Complete the form, and we'll be in touch as soon as possible.

Our accreditations and certificates