Lynda - Ethical Hacking - Mobile Devices and Platforms/01. Introduction/01_01-Welcome.mp4 |
13.7 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/01. Introduction/01_03-Course disclaimer.mp4 |
2.5 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/01. Introduction/01_02-Before watching this course.mp4 |
1.8 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/02. Mobile Technology/02_01-OWASP_ Mobile vulnerabilities.mp4 |
17.1 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/02. Mobile Technology/02_02-Static analysis of applications.mp4 |
14.7 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/02. Mobile Technology/02_03-Dynamic analysis of applications.mp4 |
5.6 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_04-Extracting and reading the manifest file.mp4 |
18.6 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_10-Dynamic analysis of Android applications.mp4 |
17.7 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_05-Extracting and reading JavaScript code.mp4 |
15.1 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_01-Android operating system.mp4 |
14.5 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_12-Setting up a KitKat virtual machine.mp4 |
13.6 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_08-Getting commandline access with Android Debug Bridge ADB.mp4 |
12.8 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_11-Using Drozer to analyze applications.mp4 |
12.3 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_03-Preparing for Android testing.mp4 |
10.9 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_02-Android security model.mp4 |
9 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_06-Recreating Java source code with JAD.mp4 |
6.2 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_07-Browsing applications directly with JADX.mp4 |
5.6 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/03. Android/03_09-Install an Android emulator from the SDK.mp4 |
4.7 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/04. iOS/04_06-Disassembling iOS executable code.mp4 |
19.3 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/04. iOS/04_07-Advancing into dynamic analysis of iOS.mp4 |
19.2 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/04. iOS/04_03-Jailbreaking for commandline access.mp4 |
18.7 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/04. iOS/04_05-Extracting properties and class headers.mp4 |
16.4 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/04. iOS/04_02-Securing iOS applications by design.mp4 |
11.2 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/04. iOS/04_01-iOS applications and vulnerabilities.mp4 |
10.7 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/04. iOS/04_04-Preparing to test iOS applications.mp4 |
9.8 MB |
Lynda - Ethical Hacking - Mobile Devices and Platforms/05. Conclusion/05_01-Summary.mp4 |
3.6 MB |