1 00:00:00,270 --> 00:00:01,570 ‫Instructor: Hi, welcome 2 00:00:02,676 --> 00:00:04,976 ‫to the Complete Mobile Ethical Hacking Course. 3 00:00:05,864 --> 00:00:08,183 ‫So within this course, we are going to learn a lot. 4 00:00:09,169 --> 00:00:11,860 ‫And I promise this is not what you're going 5 00:00:13,176 --> 00:00:14,009 ‫to get during this course. 6 00:00:14,893 --> 00:00:16,110 ‫You're not going to see any presentations, 7 00:00:16,110 --> 00:00:18,960 ‫or any other PowerPoint slides. 8 00:00:18,960 --> 00:00:22,350 ‫We're going to do a lot of practice. 9 00:00:22,350 --> 00:00:26,280 ‫This is going to be a hands-on course where you will get 10 00:00:26,280 --> 00:00:29,010 ‫to practice what you learn constantly. 11 00:00:29,010 --> 00:00:32,760 ‫But before we start, I need to explain what's included 12 00:00:32,760 --> 00:00:37,080 ‫in this course so that if you're an experienced programmer 13 00:00:37,080 --> 00:00:40,530 ‫maybe you may just want to skip some lectures, or sections, 14 00:00:40,530 --> 00:00:43,173 ‫or maybe if you're starting from scratch 15 00:00:43,173 --> 00:00:47,310 ‫you're wondering what to learn in this kind of topic. 16 00:00:47,310 --> 00:00:49,440 ‫So this will be a good opportunity 17 00:00:49,440 --> 00:00:51,870 ‫for you to learn all of those things. 18 00:00:51,870 --> 00:00:55,140 ‫So when we talk about mobile penetration testing 19 00:00:55,140 --> 00:00:59,580 ‫or mobile ethical hacking, we can mean a lot 20 00:00:59,580 --> 00:01:03,000 ‫of different sections, a lot of different subjects. 21 00:01:03,000 --> 00:01:07,620 ‫For example, are we talking about hacking the device itself, 22 00:01:07,620 --> 00:01:11,250 ‫like hacking the phone, or hacking the tablets? 23 00:01:11,250 --> 00:01:14,610 ‫Or are we talking about rooting, or jailbreaking 24 00:01:14,610 --> 00:01:19,050 ‫the iOS operating system devices, or other devices? 25 00:01:19,050 --> 00:01:23,430 ‫Or are we talking about hacking the applications themselves 26 00:01:23,430 --> 00:01:26,700 ‫like maybe cheating in a game, or finding 27 00:01:26,700 --> 00:01:29,610 ‫a vulnerability in a banking application? 28 00:01:29,610 --> 00:01:32,460 ‫Or are we talking about hacking the users 29 00:01:32,460 --> 00:01:34,950 ‫like creating a backdoor 30 00:01:34,950 --> 00:01:39,360 ‫and stealing the user's information, how hackers do that? 31 00:01:39,360 --> 00:01:42,780 ‫Or are we talking about the reverse engineering 32 00:01:42,780 --> 00:01:46,380 ‫of an application where we try to find the source codes, 33 00:01:46,380 --> 00:01:49,740 ‫or how application works in a general? 34 00:01:49,740 --> 00:01:54,270 ‫Or are we talking about the server, or API security, 35 00:01:54,270 --> 00:01:58,860 ‫or the wireless HTTPS/HTTP network attacks? 36 00:01:58,860 --> 00:02:03,860 ‫So basically, when we talk about the mobile ethical hacking 37 00:02:04,050 --> 00:02:08,460 ‫we talk about everything that you see on this list. 38 00:02:08,460 --> 00:02:12,660 ‫And I tried to actually create this course 39 00:02:12,660 --> 00:02:16,290 ‫in order to let you know all about those things. 40 00:02:16,290 --> 00:02:18,840 ‫So you're going to find different sections 41 00:02:18,840 --> 00:02:21,810 ‫for each of the subjects that you see over here, 42 00:02:21,810 --> 00:02:24,183 ‫and we are going to learn a lot. 43 00:02:25,080 --> 00:02:28,350 ‫And actually furthermore, we are going to learn 44 00:02:28,350 --> 00:02:32,910 ‫the fundamentals of iOS and Android development as well 45 00:02:32,910 --> 00:02:35,700 ‫because we need that information in order 46 00:02:35,700 --> 00:02:38,910 ‫to comprehend all of those things. 47 00:02:38,910 --> 00:02:41,310 ‫So maybe if you're an Android developer, 48 00:02:41,310 --> 00:02:43,770 ‫of course, you can actually skip 49 00:02:43,770 --> 00:02:46,560 ‫the Android development fundamentals section. 50 00:02:46,560 --> 00:02:48,690 ‫Or if you're an iOS developer, 51 00:02:48,690 --> 00:02:50,490 ‫you're more than welcome to skip 52 00:02:50,490 --> 00:02:54,870 ‫the iOS development sections and go for the other ones. 53 00:02:54,870 --> 00:02:57,270 ‫However, we are going to have to include 54 00:02:57,270 --> 00:03:00,480 ‫all of those things in the curriculum. 55 00:03:00,480 --> 00:03:03,990 ‫So this basically means that if you don't know anything 56 00:03:03,990 --> 00:03:06,540 ‫about programming or cybersecurity, 57 00:03:06,540 --> 00:03:08,670 ‫you're more than welcome to join the course 58 00:03:08,670 --> 00:03:11,340 ‫because we are going to learn everything from scratch. 59 00:03:11,340 --> 00:03:16,050 ‫And if you think about what kind of system do I have to have 60 00:03:16,050 --> 00:03:18,300 ‫in order to follow along with this course, 61 00:03:18,300 --> 00:03:21,630 ‫whether you have a MacBook, or you have a Windows, 62 00:03:21,630 --> 00:03:23,370 ‫or if you have an Android phone, 63 00:03:23,370 --> 00:03:26,490 ‫or iOS device it really doesn't matter. 64 00:03:26,490 --> 00:03:29,460 ‫So for the reverse engineering part 65 00:03:29,460 --> 00:03:33,990 ‫we have an exclusive section for the iOS reverse engineering 66 00:03:33,990 --> 00:03:38,990 ‫and that's where you need a MacBook and an iOS device. 67 00:03:39,390 --> 00:03:43,650 ‫So other than that, so 90% of the time in this course 68 00:03:43,650 --> 00:03:46,110 ‫either you have a MacBook, or a Linux, 69 00:03:46,110 --> 00:03:48,690 ‫or a Windows, it really doesn't matter. 70 00:03:48,690 --> 00:03:50,580 ‫We're going to work with virtual machines, 71 00:03:50,580 --> 00:03:53,850 ‫we're going to work with emulators, simulators 72 00:03:53,850 --> 00:03:56,910 ‫in order to comprehend, and understand 73 00:03:56,910 --> 00:04:00,750 ‫and practice every subject on this section. 74 00:04:00,750 --> 00:04:04,200 ‫So only for like one and a half hour of this course 75 00:04:04,200 --> 00:04:07,680 ‫you're gonna have to have a MacBook and an iOS device 76 00:04:07,680 --> 00:04:11,430 ‫in order to practice the iOS reverse engineering things. 77 00:04:11,430 --> 00:04:14,580 ‫So if you don't have those, don't worry about it. 78 00:04:14,580 --> 00:04:18,090 ‫You can always take notes and watch the things 79 00:04:18,090 --> 00:04:21,000 ‫that we're going to do in the sections as well. 80 00:04:21,000 --> 00:04:24,840 ‫So 90% of the time, you will be still able to practice 81 00:04:24,840 --> 00:04:27,180 ‫all of the things that we are going to learn. 82 00:04:27,180 --> 00:04:30,870 ‫But I should warn you as for the limitations 83 00:04:30,870 --> 00:04:34,380 ‫of the Apple, you're gonna have to have a MacBook, 84 00:04:34,380 --> 00:04:38,580 ‫if you want to do iOS reverse engineering most of the time. 85 00:04:38,580 --> 00:04:41,490 ‫Okay so, that's it, that's what we're going 86 00:04:41,490 --> 00:04:43,410 ‫to learn during this course. 87 00:04:43,410 --> 00:04:46,110 ‫And I should warn you, we're going to learn 88 00:04:46,110 --> 00:04:49,200 ‫how hackers hack into the mobile devices 89 00:04:49,200 --> 00:04:53,310 ‫and in mobile applications as well so don't ever forget 90 00:04:53,310 --> 00:04:56,070 ‫that you should stay in the legal boundaries. 91 00:04:56,070 --> 00:04:58,890 ‫We are learning all of these things 92 00:04:58,890 --> 00:05:01,770 ‫in order to be cybersecurity specialists, 93 00:05:01,770 --> 00:05:04,950 ‫in order to prevent bad hackers, 94 00:05:04,950 --> 00:05:08,250 ‫black hat hackers from committing these crimes 95 00:05:08,250 --> 00:05:11,340 ‫in order to create some safe spaces, 96 00:05:11,340 --> 00:05:15,360 ‫safe mobile applications, and safe mobile devices. 97 00:05:15,360 --> 00:05:17,970 ‫So don't ever forget that you should comply 98 00:05:17,970 --> 00:05:22,710 ‫with your local laws regarding the cybersecurity 99 00:05:22,710 --> 00:05:25,020 ‫and we are learning all of these things 100 00:05:25,020 --> 00:05:27,030 ‫in order to be professionals. 101 00:05:27,030 --> 00:05:30,453 ‫So now if you're ready, let's get started.