Webinar
How To Perform Manual Pentest On Mobile Applications
calendar-alt-min
Date:
Oct 9th, 2019
calendar-alt-min
Time:
3:00 PM IST / 9:30 AM GMT
calendar-alt-min
Host:
Subho Halder
About host
Subho 160X160 - Webinar

Subho Halder  CISO and Co-Founder of Appknox (Highest rated mobile Security Solution in Gartner and G2Crowd ). Subho will run you through best practices that he has  accumulated from years of experience in Enterprise Security.

Subho is well known in the Security industry as a master hacker and creator of AFE (Android framework for Exploitation). He has also  detected critical loopholes in businesses like Google,Facebook  Microsoft, Skype, and  conducted workshops at conferences like BlackHat, Defcon, ToorCon, SysCan, ClubHack, NullCon, OWASP AppSec and  RSA Conference.
LinkedIn Twitter
"See you Nov 27th. at 3:00 PM for some fun, learning, and discovery? "
LinkedIn Twitter
Combine the power of open source tools with manual penetration testing!

Learn how we combine the benefits of both manual and automated testing to multiply your testing results and speed.

What will you learn during this webinar?

This session will conclude with time dedicated to answering questions you may have and about manual penetration security testing.

Agenda

white_shield_icon
How open-source tools work.
white_shield_icon

The methodology of using tools to run pen-testing

white_shield_icon

Live demo on how these tools come in handy during an attempt to hack

white_shield_icon

A demo and analysis of test cases that are covered in running a manual security penetration operation.

Happy Learners
Still need convincing? Check out what people are saying
photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo1
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo6
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Back Next
This webinar will be of interest to:
  • Security / risk officers

  • Software / Mobile security architects

  • Product Managers

  • Mobile Developers

  • CISO’S