Search result for Android operating system Online Courses & Certifications
Get Course Alerts by Email
Learn Social Engineering & Open-source Intelligence (OSINT)
by Gabriel Avramescu- 4.4
4.5 hours on-demand video
In this course, meant for beginners with no previous knowledge about penetration testing or hacking, that will start with the basics of social engineering, and by end of it you'll be at an advanced level being able to hack into all major operating systems (windows, Android and so on), generate different types of trojans and deliver them using smart social engineering techniques....
$12.99
The Complete Cyber Security Course for Beginners
by Ameen Bineabade- 4.4
1.5 hours on-demand video
We have fun learning how to seek and destroy system resident malware and hackers. Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer....
$12.99
Dart Programming from Beginner to Expert
by Harshit Agrawal- 3.8
6 hours on-demand video
Google is also working on an Operating System Fuchsia OS which is compatible with Dart, so whenever it is going to be released developers will build apps for Fuchsia using Dart and as you know Google is a Tech Giant so if you're learning something backed by Google then it's always an added advantage to your skills....
$12.99
Kali Linux Wireless Penetration Testing - Novice to Pro!
by Packt Publishing- 0.0
11 hours on-demand video
Kali Linux is rated as the #1 security operating system for hackers. With the Linux operating system and its core structure based on Debian, it comes jam-packed with all the tools you need to penetration-test your websites. On his journeys, he has been a Linux system administrator, ethical hacker, website master, mobile developer, application creator, and game developer....
$12.99
The Complete Cyber Security Course : End Point Protection!
by Nathan House- 4.7
16.5 hours on-demand video
destroy system resident malware and hackers. Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting! How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer....
$24.99
The Comprehensive 2021 Android Development Masterclass
by Paulo Dichone | Android, Java, Flutter Developer and Teacher- 4.5
49.5 hours on-demand video
Master Modern Android API's: ROOM Database, ML Kit Face Recognition, Firestore, Firebase, Maps and Android Studio IDE Android App Development will open many doors for you since Android is the most popular operating system in the World. Or maybe it's time for a career change, and Android Development picked your interest?...
$17.99
Learn how to hack any Computer,Mobile Phone and Account
by Diaa Nassar- 0.0
1.5 hours on-demand video
Hack Android Mobiles - Mobile Testing - This chapter content is less than the first chapter because most of the lessons that were to be explained in this chapter, were explained in the first chapter and after completing this chapter you will be able to : Easily hacking the Android mobiles...
$12.99
Related searches
Smart Device & Mobile Emerging Technologies
by Jong-Moon Chung- 4.7
Approx. 32 hours to complete
, Samsung Gear S3 and the Apple Watch Series 3) are introduced along with details of the iOS and Android smartphone OSs (Operating Systems) and mobile communications 1G to 5G (for details on Wi-Fi and Bluetooth, please take my course “IoT Wireless & Cloud Emerging Technology”). 3 Android Evolution Part 1...
Push Notifications For CPA Affiliate Marketing (Case Study)
by Neil Shearing- 4.5
4.5 hours on-demand video
Note: due to the vast majority of push subscribers being on Android devices due to Apple requiring active consent, this course focuses on Android users. However, the only difference to advertise to Apple users would be to select the appropriate device or operating system at the traffic network you buy traffic from....
$11.99
Learn Ethical Hacking From Scratch
by Ashwin Pk- 0.0
4.5 hours on-demand video
You will learn how to gather information about a target computer system such as its operating system, open ports, installed services and discover weaknesses and vulnerabilities. Client Side Attacks - If the target system does not contain any weaknesses then the only way to gain access to it is by interacting with the user....
$12.99