1 00:00:00,173 --> 00:00:01,140 ‫(bright music) 2 00:00:01,140 --> 00:00:02,280 ‫-: Hello, everyone. 3 00:00:02,280 --> 00:00:06,330 ‫I'm Atil. I teach more than 180,000 students 4 00:00:06,330 --> 00:00:09,300 ‫on Udemy on mobile application development 5 00:00:09,300 --> 00:00:11,160 ‫and cyber security. 6 00:00:11,160 --> 00:00:14,160 ‫I also teach mobile application development 7 00:00:14,160 --> 00:00:16,740 ‫in Bogazici University in Turkey, 8 00:00:16,740 --> 00:00:20,490 ‫and I'm also the CEO of the Collective Academy 9 00:00:20,490 --> 00:00:23,430 ‫which is an education company in Turkey. 10 00:00:23,430 --> 00:00:26,430 ‫In this course, we are going to learn ethical hacking 11 00:00:26,430 --> 00:00:29,790 ‫for mobile applications and mobile devices. 12 00:00:29,790 --> 00:00:32,100 ‫First of all, let me just start by saying 13 00:00:32,100 --> 00:00:35,160 ‫that you don't have to have any experience 14 00:00:35,160 --> 00:00:37,230 ‫in order to get this course, 15 00:00:37,230 --> 00:00:39,780 ‫because we are going to start from scratch, 16 00:00:39,780 --> 00:00:41,940 ‫and we are going to make our way 17 00:00:41,940 --> 00:00:45,750 ‫to all the details of mobile ethical hacking. 18 00:00:45,750 --> 00:00:48,660 ‫So whether you are an experienced programmer, 19 00:00:48,660 --> 00:00:51,750 ‫or you are just starting your cyber security career, 20 00:00:51,750 --> 00:00:53,250 ‫it doesn't matter. 21 00:00:53,250 --> 00:00:57,420 ‫If you want to learn how hackers attack mobile applications 22 00:00:57,420 --> 00:01:01,530 ‫and mobile devices and how to make yourself safe 23 00:01:01,530 --> 00:01:05,576 ‫against this attacks, then you are on the right course. 24 00:01:05,576 --> 00:01:07,200 ‫(bright music) 25 00:01:07,200 --> 00:01:11,490 ‫This course includes sections for reverse engineering, 26 00:01:11,490 --> 00:01:15,030 ‫mobile application fundamentals, network sniffing, 27 00:01:15,030 --> 00:01:18,900 ‫mobile application manipulation, and so much more. 28 00:01:18,900 --> 00:01:20,490 ‫When you complete this course, 29 00:01:20,490 --> 00:01:23,460 ‫you will be able to identify the vulnerabilities 30 00:01:23,460 --> 00:01:26,640 ‫in mobile devices and mobile applications. 31 00:01:26,640 --> 00:01:29,160 ‫If you have any questions during this course, 32 00:01:29,160 --> 00:01:32,100 ‫you will be able to reach me through the Q and A section, 33 00:01:32,100 --> 00:01:35,250 ‫and I will reply them within 24 hours. 34 00:01:35,250 --> 00:01:37,802 ‫Now, if you're ready, let's get started. 35 00:01:37,802 --> 00:01:40,375 ‫(bright music)