Useful Links
Computer Science
Cybersecurity
Ethical Hacking
1. Foundations of Ethical Hacking
2. Networking Fundamentals for Hackers
3. The Ethical Hacking Methodology
4. Web Application Security Testing
5. Wireless Network Security
6. Social Engineering
7. Mobile Device Security
8. Cryptography and Cryptanalysis
9. Advanced Evasion and Anti-Forensics
10. Cloud Security and IoT Hacking
Mobile Device Security
Mobile Platform Architecture
Android Security Model
Linux Kernel Security
Application Sandbox
Permission System
Install-Time Permissions
Runtime Permissions
Custom Permissions
Android Security Framework
SELinux Implementation
Application Signing
Verified Boot
iOS Security Architecture
Hardware Security Features
Secure Enclave
Touch ID and Face ID
Hardware Encryption
Software Security Layers
Secure Boot Chain
Code Signing
Application Sandbox
Data Protection Framework
File System Encryption
Keychain Services
App Transport Security
Mobile Application Security
Android Application Security
APK Structure and Analysis
Manifest File Analysis
Resource Analysis
Code Analysis
Common Android Vulnerabilities
Insecure Data Storage
Insecure Communication
Insecure Authentication
Insufficient Cryptography
Client-Side Injection
Android Malware Analysis
Static Analysis Techniques
Dynamic Analysis Techniques
Behavioral Analysis
iOS Application Security
IPA Structure and Analysis
Info.plist Analysis
Binary Analysis
Resource Analysis
Common iOS Vulnerabilities
Insecure Data Storage
Insecure Communication
Broken Cryptography
Client-Side Injection
Binary Protection Bypass
iOS Malware Analysis
Static Analysis Challenges
Dynamic Analysis Techniques
Jailbreak Detection Bypass
Mobile Device Exploitation
Android Device Exploitation
Rooting Techniques
Exploit-Based Rooting
Unlocked Bootloader Rooting
Custom Recovery Installation
Android Debugging Bridge Exploitation
ADB Command Execution
Device Information Extraction
Application Installation and Removal
Android Vulnerability Exploitation
Privilege Escalation Exploits
Remote Code Execution
Denial of Service Attacks
iOS Device Exploitation
Jailbreaking Techniques
Untethered Jailbreaks
Tethered Jailbreaks
Semi-Untethered Jailbreaks
iOS Vulnerability Exploitation
Kernel Exploits
Sandbox Escapes
Code Signing Bypass
iOS Forensics and Data Extraction
Logical Acquisition
Physical Acquisition
File System Analysis
Mobile Network Security
Cellular Network Security
GSM Security
A5 Encryption Algorithms
SIM Card Security
GSM Vulnerabilities
3G/4G/5G Security
Authentication and Key Agreement
Encryption Protocols
Network Architecture Security
Cellular Attack Techniques
IMSI Catching
SMS Interception
Call Interception
Mobile Wi-Fi Security
Mobile Wi-Fi Vulnerabilities
Automatic Connection Risks
Captive Portal Attacks
Man-in-the-Middle Attacks
Mobile VPN Security
VPN Protocol Analysis
VPN Bypass Techniques
Bluetooth Security
Bluetooth Protocol Security
Pairing Process
Encryption Mechanisms
Authentication Methods
Bluetooth Attack Techniques
Bluejacking
Bluesnarfing
Bluetooth Denial of Service
Mobile Device Management
Enterprise Mobile Security
Mobile Device Management Solutions
Device Enrollment
Policy Enforcement
Remote Wipe Capabilities
Mobile Application Management
App Distribution
App Wrapping
App Containerization
Mobile Content Management
Secure File Sharing
Document Protection
Data Loss Prevention
BYOD Security Considerations
Personal vs Corporate Data Separation
Privacy Concerns
Compliance Requirements
Previous
6. Social Engineering
Go to top
Next
8. Cryptography and Cryptanalysis