inflearn logo

APP Penetration Testing Project Training Course (Portfolio)

- This project involves installing actual apps on mobile phones and practicing simulated hacking using hacking tools, in accordance with the inspection standards for electronic financial infrastructure and public services. - This course allows you to gain an understanding of mobile app penetration testing, overcome any hesitations, and learn everything from inspection know-how to report writing and communication methods.

12 learners are taking this course

Level Intermediate

Course period 6 months

ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training
Industrial Security Exper
Industrial Security Exper
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training
Industrial Security Exper
Industrial Security Exper

What you will gain after the course

  • Secured 100% inspection capability for mobile apps in accordance with the Electronic Financial Infrastructure Inspection Standards.

  • Secured 100% inspection capability in accordance with the public service inspection standards for mobile apps.

📱 Mobile App Penetration Testing Practice Online Course

― A complete practical training course where you learn everything from setting up a rooting environment to hands-on practice, analysis, and report writing all at once! (No audio)

Mobile environments have more extensive and complex vulnerabilities than the web.
In particular, because electronic financial infrastructure apps and public service apps (public, financial, and lifestyle services) have a significant impact on users,
their security inspection standards are extremely strict and detailed.

This online course goes beyond simple theory or screen explanations; it is a completely practice-oriented curriculum where you will set up a real rooted mobile environment, install apps, and test them using hacking tools.

It is designed to let you experience the entire process exactly as a real security consultant performs it in the field, from
“vulnerability diagnosis → analysis → deriving improvement measures → creating evidence and reports.”


🔥 Key Features of the Course

🧩 1. Hands-on mobile hacking practice based on a rooting environment

  • 🔓 How to set up a rooted test device (or emulator)

  • 📱 App Installation and Package Structure Analysis

  • 🛠️ Practical testing using mobile hacking tools (Frida, Objection, MobSF, etc.)

  • 🧪 Hands-on practice including API hooking, encryption bypass, HTTP interception, and app internal storage analysis

  • 🏗️ Perform 'real-world penetration testing' by recreating an actual diagnostic environment exactly as it is.

📋 2. Practical Configuration Based on Electronic Financial Infrastructure & Public Service App Inspection Standards

  • 🏛️ Analysis of App Inspection Items for Electronic Financial Infrastructure (Based on Electronic Financial Supervisory Regulations)

  • 🧷 Essential security standards to check for public-facing service apps (public sector and large-scale user services)

  • 🔐 Handling of sensitive information, session/token security, authentication/authorization vulnerabilities, and encryption verification

  • 🛡️ UI/UX-based security inspection (error information exposure, user notifications, risk warnings)

  • 📂 Disclosure of evidence collection methods and determination criteria actually verified by inspection agencies

⚔️ 3. Hands-on Practice for Key Mobile-Specific Vulnerabilities

  • 🧨 Bypassing Decompilation and Debugging Defenses

  • 🔍 SSL Pinning Bypass and Traffic Manipulation

  • 🗂️ Analysis of sensitive information stored in plaintext within internal storage

  • 🔑 Extraction of hardcoded API keys and tokens

  • 🤖 Verification of risks associated with malicious app integration

  • 🪤 Practice on authorization bypass and vulnerable API calls

  • 📉 Learning focused on vulnerabilities frequently discovered in actual financial institutions and public services


📘 Curriculum Structure

1️⃣ Understanding Basic Mobile Security Architecture

  • OS Structure and Security Models (iOS vs. Android)

  • Principles of rooting/jailbreaking and their security implications

  • Analysis of app package structure and security elements

2️⃣ Building a Penetration Testing Lab Environment

  • Configuring a rooted device

  • Proxy, hooking, and debugging tool configuration

  • Installation and initial inspection of the target test app

3️⃣ Vulnerability Analysis Practice

  • 🔥 API Communication Analysis and Authentication/Authorization Error Practice

  • 🔍 App Internal Data Protection Vulnerability Practice

  • 🔧 Code Obfuscation and Security Module Inspection

  • 🧬 Encryption method analysis and high-risk vulnerability inspection

4️⃣ Deriving Improvement Plans

  • Security configuration methods according to electronic financial infrastructure standards

  • Essential security items to apply when developing public service apps

  • Improvement plans for sensitive information encryption, key management, session management, and API authentication

  • Designing the application security module implementation architecture

5️⃣ Result Report Writing Practice

  • 📝 Provision of actual inspection report templates

  • 📎 Explanation of 'Good/Caution/Vulnerable' determination criteria

  • 📑 Providing practical guides on which evidence to capture and how to capture it

  • 🛠️ Structured based on actual consulting procedures, including how to write improvement recommendations.


🎯 This course is essential for these types of people!

  • Mobile app developers and operators who need an understanding of security

  • Information security officers who need to perform inspections on electronic financial infrastructure or public service apps

  • Security managers who need to acquire the ability to diagnose mobile service vulnerabilities within an enterprise

  • All developers and engineers who want to learn real-world, practice-oriented mobile penetration testing.

  • Beginner and intermediate practitioners who lack the ability to write security reports


🎓 What you will gain from this course

  • ✔ Acquire practical skills to independently perform the entire process of mobile app penetration testing

  • ✔ Acquisition of inspection capabilities at the level of electronic financial infrastructure

  • ✔ Improved ability to utilize rooting environments and practical hacking tools

  • ✔ Experience the entire consulting process, including writing result reports and deriving improvement plans

  • ✔ Acquire independent capabilities to perform actual app inspections on your own


📢 Register now!

It is rare to find a fully hands-on mobile security training where you analyze real apps in a rooted environment, directly attack vulnerabilities,
and even write a final report.
Complete your mobile app vulnerability analysis and remediation skills through this course!

Recommended for
these people

Who is this course right for?

  • Those who have no experience with mobile app penetration testing or find it difficult.

  • Those who have experience with mobile app inspection but feel the need to strengthen their capabilities.

Need to know before starting?

  • Understanding and experience in WEB penetration testing

  • Understanding and experience in electronic financial infrastructure management systems

Hello
This is jueygrace

202

Learners

15

Reviews

4.3

Rating

26

Courses

Security Consulting

Curriculum

All

3 lectures ∙ (15min)

Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!

$26.40