1 00:00:00,790 --> 00:00:02,090 Hey, what's up, guys? 2 00:00:02,230 --> 00:00:06,880 This is Shubham from Cyber Security Online Training, and we have designed this course, especially 3 00:00:06,880 --> 00:00:11,700 for those who want to know about Android and US system and vulnerabilities. 4 00:00:11,950 --> 00:00:16,470 And if you find one, you may gain access to someone's smartphone that's called hacking. 5 00:00:16,630 --> 00:00:19,330 This court is divided into three parts or three sections. 6 00:00:19,480 --> 00:00:20,610 So let's get started. 7 00:00:21,070 --> 00:00:24,490 First of all, let's see what is there for you in the first part of this calls. 8 00:00:24,670 --> 00:00:29,530 So we will start with mobile device vulnerabilities that are categorized by Wesp organization. 9 00:00:29,860 --> 00:00:35,620 Then you will learn how difficult it is for enterprises to protect their infrastructure when their employees 10 00:00:35,620 --> 00:00:37,400 bring their own devices to work. 11 00:00:37,750 --> 00:00:43,480 We have also given an introduction to mobile device management and mobile device security policies in 12 00:00:43,480 --> 00:00:44,120 the next part. 13 00:00:44,350 --> 00:00:50,170 We will start with Android security structure and then we will explore what Android emulators are. 14 00:00:50,590 --> 00:00:53,770 And then we will learn about Android hacking tools and techniques. 15 00:00:54,070 --> 00:01:00,490 And in the last section of this course, we will start with US security, how to break use devices and 16 00:01:00,490 --> 00:01:02,670 how to disassemble US applications. 17 00:01:03,010 --> 00:01:04,180 That's it for this lecture. 18 00:01:04,210 --> 00:01:05,770 Hope to see you in the first section.