Advanced Mobile Exploitation (AME)

Course Description Schedule Course Outline

Who should attend

  • System Administrators
  • Web Developers
  • SOC analysts
  • Penetration testers
  • Network Engineers
  • Security Enthusiasts


You are expected to have a basic knowledge of Mobile Operating Systems.Knowledge of programming languages (Java and C, and Python for scripting) will be an added advantage to grasp things quickly.

Course Objectives

After completion of this course, you will learn:

  • Platform security for common mobile OS
  • Platform exploitation
  • Key security principles, approaches, tools and techniques
  • Application security auditing
  • Code signing
  • Inspect binaries

Course Content

Advanced Mobile Exploitation is a 3 day course that focuses on Android and iOS exploitation. This fast-paced training will familiarize you with the various Android and iOS exploitation techniques, as well as bypassing most of the existing security models in both platforms. You will also learn exploitation techniques such as Stack Based Buffer Overflows, Gadget Chaining, ROP and Bypassing protections. This class also covers topics such as writing your own malware, auditing complicated and protected applications, automated static and dynamic analysis, Dex Exploitation, ARM™, OWASP Mobile, Top 10 and a lot more. At the end of the class, there will be a final CTF challenge where you will have to identify security vulnerabilities and exploit them.

Classroom Training
Modality: C

Duration 3 days

Price (excl. tax)
  • Australia: 3,300.- AUD
Dates and Booking
Click on town name to bookSchedule
Asia Pacific