AICouncil is offering course on Mobile application penetration testing with several guided Hands on exercises to improve your pentesting skills. The evolution of mobile application has created a new range of attacks that are not so conventional like web applications. Mobile application vulnerabilities lead to more sophisticated attacks which needs to be addressed to avoid any security breach. Final project will be focused on applying the techniques explained over mobile applications to test any security concern.
Problem Statement: - Conduct a cyber-threat assessment to identify any possible bypass of security control.
Description: - Attackers uses control bypass methods such as Social Engineering Attacks, NAC bypass methods, DLP control bypass etc. As some cyber-security personnel you need to asses any possible risk, vulnerability assessment and/or penetration testing to identify any possible weakness in policy, procedure & practices.
Problem Statement: - Find out where or How credentials are being stored and vulnerable code
Description: - While one stores any confidential item on his/her device, information security needs to be addressed. If you are storing insecurely i.e poor encryption, as plain text, poorly managed access control then attacker can penetrate into your device. In this project you will find out if any vulnerability present into your data storage area or not.
Problem Statement: - Check if your android device is vulnerable for tapjacking
Description: - With social engineering tricks one can create an app that can trick a user to tap a specifically-crafted app popup window as gateway for varied threats. A tapjack app needs a screen overlay permission to potentially trick you into feeding sensitive data. A malicious app with screen overlay permission could place a fake password input on top of a real login screen tn order to collect your actual password. In this project you need to identify such vulnerability to make a mobile device more secure.
There is no such prerequisite if you are enrolling for Master’s Course as everything will start from scratch. Whether you are a working IT professional or a fresher you will find a course well planned and designed to incorporate trainee from various professional backgrounds.