SEC575 Mobile Device Security and Ethical Hacking 2017

mp4   Hot:271   Size:9.67 GB   Created:2019-01-20 15:40:22   Update:2021-12-12 09:14:30  

File List

  • Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_28.mp4 210.18 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_43.mp4 196.39 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_20.mp4 145.96 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_28_2.mp4 131.4 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_9_2.mp4 129.02 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.2 Sidejacking Attacks/SANS OnDemand_9_2.mp4 128.94 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_34_2.mp4 128.92 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_8.mp4 125.88 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_22.mp4 121.88 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_3.mp4 112.59 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_33.mp4 110.19 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_16.mp4 109.15 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_12_2.mp4 108.91 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_12_3.mp4 108.91 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.7 HTTP Parameter Tampering/SANS OnDemand_10.mp4 108.68 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_34.mp4 106.75 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_2_2.mp4 106.27 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_19_2.mp4 105.49 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_6_2.mp4 101.55 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_5.mp4 94.76 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_27.mp4 85.32 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_14.mp4 79.26 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_25.mp4 77.89 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_15.mp4 77.52 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_12_2.mp4 74.66 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_17.mp4 74.65 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_21.mp4 72.29 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_4.mp4 65.94 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_32.mp4 65.54 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_24.mp4 65.32 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.4 Mapping Client Network Probe Activity/SANS OnDemand_6_2.mp4 64.25 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_14_2.mp4 58.78 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.4 Mapping Client Network Probe Activity/SANS OnDemand_10_2.mp4 57.89 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_23_2.mp4 57.24 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_9.mp4 55.58 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_6.mp4 55.46 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_21.mp4 53.74 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_26.mp4 52.43 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_15.mp4 51.78 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_17_2.mp4 51.25 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_8_3.mp4 49.62 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_9.mp4 49.09 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_14.mp4 48.96 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_8_2.mp4 46.84 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_21_2.mp4 46.51 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.9 Where To Go From Here/SANS OnDemand_6.mp4 46.43 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_12_2.mp4 45.4 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_24_2.mp4 44.55 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_18_2.mp4 43.91 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_22.mp4 43.18 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_25_2.mp4 42.71 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_18.mp4 42.46 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_11_2.mp4 42.14 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_41.mp4 41.18 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_14.mp4 39.91 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_6.mp4 39.89 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_12.mp4 39.35 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_10.mp4 37.52 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_7.mp4 37.1 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_15_2.mp4 35.71 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_21.mp4 35.62 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_6_2.mp4 35.5 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_15.mp4 34.14 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_23.mp4 32.41 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_33.mp4 29.96 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_14_2.mp4 29.86 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_5_2.mp4 29.66 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.7 HTTP Parameter Tampering/SANS OnDemand_7.mp4 29.39 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_16.mp4 29.35 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_19_2.mp4 28.49 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_24_2.mp4 28.32 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_31.mp4 27.83 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_16.mp4 27.37 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_9_2.mp4 27.13 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_9_3.mp4 27.13 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_6.mp4 27.08 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_12.mp4 26.77 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_10.mp4 26.73 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_17.mp4 25.45 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_5_2.mp4 25.44 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_22_2.mp4 25.24 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_7.mp4 25 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_14.mp4 24.97 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_12.mp4 24.82 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.8 Pen Test Conclusion Part 1/SANS OnDemand_2.mp4 24.51 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_10.mp4 24.35 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_9_2.mp4 24.12 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_12_2.mp4 23.88 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_20_2.mp4 23.01 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_6.mp4 22.92 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_17_2.mp4 22.67 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_7_2.mp4 22.58 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_10.mp4 22.03 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_13_2.mp4 21.73 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_8_2.mp4 21.55 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_4.mp4 21.37 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_9_2.mp4 21.31 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_7_2.mp4 21.25 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_4.mp4 21.13 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_12_2.mp4 21.1 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_4.mp4 20.62 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_21_2.mp4 20.18 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_2.mp4 20.17 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_12.mp4 19.82 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_10.mp4 19.75 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_5_2.mp4 19.65 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_3.mp4 19.62 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_15_2.mp4 19.54 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_4_2.mp4 19.51 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_18_2.mp4 19.07 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_15_2.mp4 18.99 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_18.mp4 18.97 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_19_2.mp4 18.95 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_10_2.mp4 18.84 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_19.mp4 18.71 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_10.mp4 18.69 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_4_2.mp4 18.59 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_5_2.mp4 18.28 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_3_2.mp4 18.16 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_14.mp4 18.11 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_15.mp4 18.08 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_6.mp4 18 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand.mp4 17.69 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_11_3.mp4 17.66 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_2_2.mp4 17.41 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_15_2.mp4 17.22 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_17.mp4 17.14 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_27_2.mp4 17.09 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_13.mp4 17.07 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_13.mp4 17.07 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_4_2.mp4 17.07 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_21.mp4 17.02 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_3.mp4 16.87 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.9 Where To Go From Here/SANS OnDemand_5.mp4 16.75 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_4.mp4 16.73 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_8.mp4 16.66 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_6_2.mp4 16.61 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_2_3.mp4 16.49 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_3.mp4 16.43 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_30_2.mp4 16.36 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_26_3.mp4 16.3 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_16_2.mp4 16.06 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.5 Open Network Attacks/SANS OnDemand_2.mp4 16.03 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_14_2.mp4 15.9 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_13.mp4 15.84 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_13_2.mp4 15.63 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_4_2.mp4 15.57 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_8.mp4 15.52 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_25_3.mp4 15.5 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_12_2.mp4 15.49 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.2 Sidejacking Attacks/SANS OnDemand_4_2.mp4 15.4 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_2_3.mp4 15.31 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_10.mp4 15.2 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_4.mp4 15.18 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_20.mp4 15.07 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_5_2.mp4 14.94 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_9.mp4 14.92 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_31.mp4 14.89 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_8.mp4 14.78 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_4.mp4 14.6 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_4_2.mp4 14.6 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_8.mp4 14.58 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_7.mp4 14.54 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_7.mp4 14.48 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_32.mp4 14.33 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_16.mp4 14.29 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_18_2.mp4 14.27 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_9_2.mp4 14.2 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_9.mp4 14.09 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_5_2.mp4 14.09 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_12.mp4 14.08 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_31_2.mp4 14.07 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_17.mp4 14.03 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_29_2.mp4 13.96 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_7_2.mp4 13.75 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_22.mp4 13.74 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_7_2.mp4 13.71 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_9.mp4 13.68 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.5 Open Network Attacks/SANS OnDemand_3.mp4 13.57 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_4_2.mp4 13.56 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_11.mp4 13.55 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_10.mp4 13.54 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_16_3.mp4 13.33 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_10_2.mp4 13.32 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_4.mp4 13.31 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_17.mp4 13.28 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_20.mp4 13.22 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_21_2.mp4 13.21 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_12_2.mp4 13.19 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_14_2.mp4 13.17 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_15.mp4 13.1 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_8_3.mp4 12.99 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.1 Introduction Securing Mobile Environments/SANS OnDemand_2_2.mp4 12.88 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_14_2.mp4 12.45 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_18.mp4 12.43 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_16.mp4 12.36 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_6.mp4 12.32 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_8.mp4 12.25 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_3_2.mp4 12.16 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_20_2.mp4 12.03 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_3_2.mp4 12.02 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_18_2.mp4 11.98 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_7.mp4 11.96 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_28.mp4 11.95 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_8.mp4 11.93 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_12.mp4 11.89 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_2.mp4 11.8 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_22_2.mp4 11.79 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_5.mp4 11.78 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_14_2.mp4 11.74 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_15_2.mp4 11.72 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_26.mp4 11.7 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_6_2.mp4 11.62 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_9.mp4 11.59 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_13_2.mp4 11.58 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_6.mp4 11.53 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_2.mp4 11.5 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_16.mp4 11.49 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_20.mp4 11.48 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_11_2.mp4 11.47 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_2_3.mp4 11.27 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_10_3.mp4 11.21 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_21.mp4 11.16 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_14.mp4 11.13 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_18.mp4 11.1 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_23_3.mp4 11.09 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_10_2.mp4 11.07 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_4_2.mp4 11.01 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_19.mp4 11 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_41.mp4 10.94 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_20.mp4 10.93 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_13_2.mp4 10.88 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.2 Sidejacking Attacks/SANS OnDemand_6_2.mp4 10.82 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_22_2.mp4 10.76 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_33.mp4 10.72 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_23.mp4 10.65 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_9_2.mp4 10.62 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_5.mp4 10.58 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_8_2.mp4 10.56 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_19.mp4 10.55 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_5_2.mp4 10.49 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_19_3.mp4 10.43 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.2 Sidejacking Attacks/SANS OnDemand_2.mp4 10.43 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_17_2.mp4 10.41 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_27_3.mp4 10.38 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_5_2.mp4 10.3 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_23_2.mp4 10.27 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_11.mp4 10.24 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_6_2.mp4 10.24 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_11.mp4 10.22 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_11_2.mp4 10.22 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_16_2.mp4 10.14 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.2 Sidejacking Attacks/SANS OnDemand_5_2.mp4 10.14 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_4.mp4 10.12 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_19_2.mp4 10.1 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_3_2.mp4 10.08 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_8_3.mp4 10 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_7_2.mp4 9.96 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.7 HTTP Parameter Tampering/SANS OnDemand_2.mp4 9.84 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_11.mp4 9.81 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_5.mp4 9.79 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_6.mp4 9.77 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_24.mp4 9.77 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_7.mp4 9.77 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_14.mp4 9.69 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_24.mp4 9.68 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_18.mp4 9.67 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_17_2.mp4 9.67 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_25.mp4 9.59 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_10.mp4 9.57 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_28_2.mp4 9.5 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_21_3.mp4 9.42 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_26_2.mp4 9.39 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_21_2.mp4 9.33 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_21_3.mp4 9.32 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_25_2.mp4 9.31 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.5 Open Network Attacks/SANS OnDemand_4.mp4 9.22 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_10.mp4 9.19 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_3.mp4 9.17 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_21.mp4 9.16 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_30.mp4 9.14 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_24_2.mp4 9.13 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_21.mp4 9.12 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.1 Introduction Securing Mobile Environments/SANS OnDemand_8.mp4 8.99 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_8.mp4 8.99 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_16.mp4 8.95 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_9.mp4 8.93 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_12_2.mp4 8.9 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.4 Mapping Client Network Probe Activity/SANS OnDemand_3_2.mp4 8.9 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_6.mp4 8.76 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_24.mp4 8.75 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_4.mp4 8.73 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.7 HTTP Parameter Tampering/SANS OnDemand_4.mp4 8.73 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_3_2.mp4 8.71 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_6.mp4 8.68 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_2_3.mp4 8.65 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_13_2.mp4 8.63 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_4_2.mp4 8.57 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_11.mp4 8.56 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_25.mp4 8.54 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_19_2.mp4 8.52 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_11.mp4 8.49 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_4.mp4 8.49 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_13.mp4 8.47 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_5.mp4 8.46 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_11.mp4 8.38 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_13.mp4 8.37 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_6.mp4 8.34 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_15_2.mp4 8.32 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_7.mp4 8.31 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_20_2.mp4 8.28 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_9.mp4 8.24 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_7_2.mp4 8.19 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_23_2.mp4 8.19 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_8_2.mp4 8.14 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_3.mp4 8.12 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_5.mp4 8.1 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_24_3.mp4 8.08 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_20_3.mp4 8.06 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_17_2.mp4 8.06 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.9 Where To Go From Here/SANS OnDemand_4.mp4 8.05 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_17.mp4 8.01 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_18_2.mp4 8 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_6_3.mp4 7.98 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_22.mp4 7.93 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_15.mp4 7.93 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_12.mp4 7.91 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_7.mp4 7.88 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_17.mp4 7.86 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_3.mp4 7.82 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_13.mp4 7.82 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_10_2.mp4 7.77 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_9_3.mp4 7.76 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_11.mp4 7.72 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_9_2.mp4 7.68 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_5.mp4 7.61 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_7_2.mp4 7.61 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_2_2.mp4 7.59 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_19_3.mp4 7.57 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.4 Mapping Client Network Probe Activity/SANS OnDemand_2.mp4 7.55 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_13.mp4 7.53 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_4_2.mp4 7.53 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_5_3.mp4 7.53 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_16.mp4 7.47 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_15_3.mp4 7.43 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_17.mp4 7.42 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.5 Open Network Attacks/SANS OnDemand_6.mp4 7.39 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_16.mp4 7.36 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_15_2.mp4 7.32 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_2_2.mp4 7.31 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.7 HTTP Parameter Tampering/SANS OnDemand_3.mp4 7.31 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_20.mp4 7.3 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_9_2.mp4 7.27 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_6_2.mp4 7.24 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_16_2.mp4 7.22 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_6_2.mp4 7.22 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_22.mp4 7.21 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_30.mp4 7.11 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_8_2.mp4 7.1 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.4 Mapping Client Network Probe Activity/SANS OnDemand_4_2.mp4 7.1 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_15.mp4 7.06 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_6.mp4 7.03 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_3_2.mp4 7.02 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.1 Introduction Securing Mobile Environments/SANS OnDemand_3_2.mp4 6.94 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_19.mp4 6.93 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_29.mp4 6.92 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_6.mp4 6.82 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_16.mp4 6.79 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_2_2.mp4 6.77 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_12.mp4 6.73 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.7 HTTP Parameter Tampering/SANS OnDemand_5.mp4 6.69 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_25.mp4 6.64 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_7.mp4 6.63 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_14.mp4 6.6 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_2_3.mp4 6.59 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_8.mp4 6.57 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.9 Where To Go From Here/SANS OnDemand_7.mp4 6.56 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_14.mp4 6.54 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_15.mp4 6.53 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_28.mp4 6.43 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_15.mp4 6.3 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_39.mp4 6.29 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.5 Open Network Attacks/SANS OnDemand_7.mp4 6.24 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_23_2.mp4 6.23 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_5_2.mp4 6.23 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_32_2.mp4 6.22 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_2_2.mp4 6.19 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_13.mp4 6.19 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_19_2.mp4 6.16 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_5.mp4 6.06 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_16_2.mp4 6.05 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_14_2.mp4 6.03 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_11.mp4 6.01 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_3.mp4 5.98 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_8_3.mp4 5.98 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_2_2.mp4 5.97 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_26_2.mp4 5.97 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_2_3.mp4 5.96 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_5.mp4 5.95 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_5_3.mp4 5.95 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_26.mp4 5.88 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_10_2.mp4 5.88 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_10_3.mp4 5.88 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_37.mp4 5.87 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_6_3.mp4 5.86 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_26_2.mp4 5.82 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_18.mp4 5.81 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_18.mp4 5.81 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_13_3.mp4 5.8 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_3_2.mp4 5.8 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_4_3.mp4 5.8 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_1.mp4 5.8 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_10_2.mp4 5.73 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_30.mp4 5.72 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_4.mp4 5.67 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_12.mp4 5.67 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_10_2.mp4 5.65 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_7_3.mp4 5.65 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_24_2.mp4 5.64 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_28.mp4 5.57 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_40.mp4 5.57 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_3_2.mp4 5.47 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_29.mp4 5.44 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_27_2.mp4 5.41 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_36.mp4 5.35 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_28_2.mp4 5.33 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_27.mp4 5.32 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand.mp4 5.32 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_15_3.mp4 5.31 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_8_2.mp4 5.29 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_13.mp4 5.27 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_13_2.mp4 5.27 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_10.mp4 5.27 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_19.mp4 5.25 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_8_2.mp4 5.23 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_11_2.mp4 5.19 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_10_2.mp4 5.19 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.2 Sidejacking Attacks/SANS OnDemand_3.mp4 5.17 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_23.mp4 5.17 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.5 Open Network Attacks/SANS OnDemand_8.mp4 5.16 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_23_2.mp4 5.15 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.1 Introduction Securing Mobile Environments/SANS OnDemand_4_2.mp4 5.15 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_25_2.mp4 5.15 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.4 Mapping Client Network Probe Activity/SANS OnDemand_5_2.mp4 5.13 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_7.mp4 5.09 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_10.mp4 5.09 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_7_2.mp4 5.08 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_29.mp4 5.06 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_11.mp4 5.05 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.5 Open Network Attacks/SANS OnDemand_5.mp4 5.02 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_7_2.mp4 4.94 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_7_3.mp4 4.94 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_6_2.mp4 4.92 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_6_3.mp4 4.92 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_2_2.mp4 4.88 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_40_2.mp4 4.87 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_2.mp4 4.85 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_2_3.mp4 4.85 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_11_2.mp4 4.84 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_12.mp4 4.77 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_4_3.mp4 4.77 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_4.mp4 4.76 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_3.mp4 4.72 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_32_2.mp4 4.71 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_19.mp4 4.69 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_13.mp4 4.67 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_12.mp4 4.66 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_13.mp4 4.66 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_3.mp4 4.63 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_2_4.mp4 4.63 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_6_2.mp4 4.61 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.7 HTTP Parameter Tampering/SANS OnDemand_6.mp4 4.59 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_4_3.mp4 4.58 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_9.mp4 4.58 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_9.mp4 4.57 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_23.mp4 4.56 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_15.mp4 4.54 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_8_2.mp4 4.54 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_8_3.mp4 4.54 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_11_3.mp4 4.53 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_22_2.mp4 4.45 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_18_3.mp4 4.42 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_10_3.mp4 4.4 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand.mp4 4.39 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_13.mp4 4.35 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_3.mp4 4.31 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_3_3.mp4 4.31 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_3_2.mp4 4.3 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.6 Web Application Attacks/SANS OnDemand_3_2.mp4 4.27 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_23_3.mp4 4.25 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_25.mp4 4.19 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_18.mp4 4.19 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_22_2.mp4 4.19 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.9 Where To Go From Here/SANS OnDemand_2.mp4 4.19 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_16.mp4 4.16 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_5_2.mp4 4.15 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand.mp4 4.15 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_7_3.mp4 4.14 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_14.mp4 4.12 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_5.mp4 4.11 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.9 Where To Go From Here/SANS OnDemand_3.mp4 4.1 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_9_2.mp4 4.1 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.4 Mapping Client Network Probe Activity/SANS OnDemand_8_2.mp4 4.1 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_9.mp4 4.09 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_17.mp4 4.08 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_29_2.mp4 4.08 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_20.mp4 4.05 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_8.mp4 4.03 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.6 Web Application Attacks/SANS OnDemand_2_2.mp4 4.03 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_16_3.mp4 4.02 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_23.mp4 4.01 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_4_2.mp4 4 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.7 HTTP Parameter Tampering/SANS OnDemand_8.mp4 3.98 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_1.mp4 3.96 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_19.mp4 3.94 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_31_2.mp4 3.94 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_5.mp4 3.92 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_22.mp4 3.86 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.6 Web Application Attacks/SANS OnDemand_24.mp4 3.85 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_14.mp4 3.77 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_10.mp4 3.77 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_19.mp4 3.74 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_7.mp4 3.72 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_20_3.mp4 3.71 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_17.mp4 3.63 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_24.mp4 3.63 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_11.mp4 3.6 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_15.mp4 3.57 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_8_2.mp4 3.56 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_22_3.mp4 3.55 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_26_2.mp4 3.46 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_22.mp4 3.45 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_8.mp4 3.44 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_27_2.mp4 3.4 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_27.mp4 3.38 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_3.mp4 3.36 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_13_2.mp4 3.34 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_22_3.mp4 3.3 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_2_2.mp4 3.3 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_19.mp4 3.29 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_13_3.mp4 3.26 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_4_2.mp4 3.25 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_16.mp4 3.23 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_7_2.mp4 3.2 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_3_2.mp4 3.2 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_14_3.mp4 3.19 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_21.mp4 3.17 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_30_2.mp4 3.17 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_12.mp4 3.14 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_38.mp4 3.14 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.5 Open Network Attacks/SANS OnDemand.mp4 3.1 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand.mp4 3.1 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_6_2.mp4 3.06 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.2 Sidejacking Attacks/SANS OnDemand_7_2.mp4 3.05 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_29.mp4 3.03 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_5_2.mp4 2.95 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_5_3.mp4 2.95 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_22.mp4 2.94 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_17.mp4 2.88 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_2.mp4 2.86 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_5.mp4 2.83 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_17_3.mp4 2.82 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand.mp4 2.81 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_21.mp4 2.77 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_8_2.mp4 2.74 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_14_3.mp4 2.72 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_11_2.mp4 2.63 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_8.mp4 2.62 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_25_3.mp4 2.57 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_21.mp4 2.57 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_26.mp4 2.54 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_16.mp4 2.54 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand_20.mp4 2.53 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.4 Mapping Client Network Probe Activity/SANS OnDemand_7_2.mp4 2.5 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_3_3.mp4 2.46 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.4 Mapping Client Network Probe Activity/SANS OnDemand_2_3.mp4 2.45 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_9.mp4 2.44 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_26_3.mp4 2.44 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.3 Wireless Network Scanning/SANS OnDemand_20.mp4 2.42 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_18.mp4 2.39 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_8_2.mp4 2.38 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_13.mp4 2.36 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.5 Client Side Injection Attacks/SANS OnDemand.mp4 2.33 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_24.mp4 2.32 MB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand.mp4 2.3 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_15.mp4 2.28 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand.mp4 2.27 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_20.mp4 2.26 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_18_2.mp4 2.24 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_6_2.mp4 2.21 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_28_3.mp4 2.19 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_3_3.mp4 2.09 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_11_2.mp4 2.08 MB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand.mp4 2.07 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand.mp4 2.05 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_15.mp4 2.01 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_12_3.mp4 1.98 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_1.mp4 1.92 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_23.mp4 1.9 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_34.mp4 1.88 MB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_3_2.mp4 1.86 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_16.mp4 1.86 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_9_3.mp4 1.82 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.8 Pen Test Conclusion Part 1/SANS OnDemand.mp4 1.82 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.7 HTTP Parameter Tampering/SANS OnDemand_9.mp4 1.81 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.2 Sidejacking Attacks/SANS OnDemand.mp4 1.67 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_25_2.mp4 1.65 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_14.mp4 1.63 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_3_2.mp4 1.63 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_12_3.mp4 1.61 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_20_2.mp4 1.52 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand.mp4 1.52 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_31WEBM.mp4 1.52 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_1.mp4 1.52 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_33_2.mp4 1.52 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_18.mp4 1.4 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.7 Mitigating Mobile Malware/SANS OnDemand_16_2.mp4 1.4 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_10_2.mp4 1.36 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.6 Weak Network Infrastructure Attacks/SANS OnDemand_14.mp4 1.36 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.4 Mapping Client Network Probe Activity/SANS OnDemand_9_2.mp4 1.35 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.4 What You Need to Know About Android/SANS OnDemand_18.mp4 1.33 MB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_42.mp4 1.32 MB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_9.mp4 1.3 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_17.mp4 1.27 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand.mp4 1.27 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.5 What You Need to Know About Wearable Devices/SANS OnDemand_2_2.mp4 1.25 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_30.mp4 1.23 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_13.mp4 1.19 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_19.mp4 1.17 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_31.mp4 1.14 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_12.mp4 1.13 MB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_19.mp4 1.13 MB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand.mp4 1.13 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand.mp4 1.12 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_1.mp4 1.12 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.9 Where To Go From Here/SANS OnDemand.mp4 1.12 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.7 HTTP Parameter Tampering/SANS OnDemand.mp4 1.05 MB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_35.mp4 1.02 MB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_38.mp4 1.01 MB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.2 Sidejacking Attacks/SANS OnDemand_8_2.mp4 976.92 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand.mp4 936.99 KB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.8 SQL Injection Attacks/SANS OnDemand_20.mp4 927.4 KB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_33_2.mp4 861.86 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_15.mp4 851.78 KB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_12.mp4 819.78 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_11_2.mp4 818.26 KB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_2_2.mp4 808.55 KB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_24_3.mp4 787.89 KB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand.mp4 776 KB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_12.mp4 757.25 KB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.2 Leveraging Mobile Malware/SANS OnDemand_15_2.mp4 747.89 KB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_7.mp4 728.56 KB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.1 Network Manipulation Attacks/SANS OnDemand_11.mp4 678.63 KB
    Section 2 Mobile Platform Access and Application Analysis/2.1 Unlocking, Rooting, and Jailbreaking/SANS OnDemand_2_2.mp4 673.65 KB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_2_4.mp4 666.92 KB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_23.mp4 643.12 KB
    Section 3 Mobile Application Reverse Engineering/3.4 App Report Cards/SANS OnDemand_37.mp4 623.64 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_25.mp4 602.48 KB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_21_2.mp4 532.06 KB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_5.mp4 517.88 KB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_10_2.mp4 508.17 KB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_19_2.mp4 480.14 KB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_39.mp4 478.63 KB
    Section 1 - Device Architecture and Common Mobile Threats/1.6 Building Your Lab/SANS OnDemand_7.mp4 454.71 KB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_18_2.mp4 406.42 KB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_20_2.mp4 404.52 KB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_17_2.mp4 402.15 KB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_14_2.mp4 398.27 KB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_13_2.mp4 397.1 KB
    Section 1 - Device Architecture and Common Mobile Threats/1.2 Mobile Problems and Opportunities/SANS OnDemand_21.mp4 358.97 KB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_7_2.mp4 354.66 KB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_35_2.mp4 351.93 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_11.mp4 337.37 KB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_27_2.mp4 333.98 KB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_11_2.mp4 321.06 KB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.4 Network Traffic Manipulation/SANS OnDemand_11_3.mp4 321.06 KB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_2_2.mp4 293.65 KB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_37_2.mp4 288.43 KB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_11_2.mp4 287.51 KB
    Section 2 Mobile Platform Access and Application Analysis/2.3 Network Activity Analysis/SANS OnDemand_27.mp4 286.44 KB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_38_2.mp4 284.28 KB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_20_2.mp4 274.82 KB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_36_2.mp4 259.03 KB
    Section 5 Penetration Testing Mobile Devices, Part 2/5.3 SSL-TLS Attacks/SANS OnDemand_9.mp4 247.98 KB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.7 Enterprise Wireless Attacks/SANS OnDemand_12_2.mp4 246.28 KB
    Section 2 Mobile Platform Access and Application Analysis/2.2 Data Storage and Filesystems/SANS OnDemand_17_2.mp4 231.56 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_32.mp4 231.35 KB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand_39_2.mp4 217.5 KB
    Section 6 Capture the Flag/6.1 Securing Mobile Environments Final Workshop/SANS OnDemand_15.mp4 204.55 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_9_2.mp4 203.11 KB
    Section 4 Penetration Testing Mobile Devices, Part 1/4.1 Mobile Penetration Testing/SANS OnDemand.mp4 176.47 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_13.mp4 159.25 KB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_18_3.mp4 153.61 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_14.mp4 150.56 KB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_32.mp4 150.35 KB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_40.mp4 146.31 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_16_2.mp4 130.24 KB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_35.mp4 126.24 KB
    Section 1 - Device Architecture and Common Mobile Threats/1.8 Mitigating the Stolen Device Threat/SANS OnDemand_11.mp4 121.45 KB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_34.mp4 107.75 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_10.mp4 106.87 KB
    Section 3 Mobile Application Reverse Engineering/3.2 Reverse Engineering Obfuscated Applications/SANS OnDemand_31.mp4 106.09 KB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_17_3.mp4 103.63 KB
    Section 3 Mobile Application Reverse Engineering/3.1 Automating App Analysis/SANS OnDemand_36.mp4 88.46 KB
    Section 1 - Device Architecture and Common Mobile Threats/1.3 What You Need to Know About iOS/SANS OnDemand_16_2.WEBM 0 B

Download Info

  • Tips

    “SEC575 Mobile Device Security and Ethical Hacking 2017” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.