Public Sector

We've had the pleasure of working with UK and overseas central and local government departments, including Healthcare (NHS and Foundation Trusts), Defence, Education (Universities and colleges), many of the main Civil Service departments, Emergency Services; also public-owned corporations including the BBC, Bank of England, Ordnance Survey, and regulatory bodies such as Ofgem.

We are registered on Crown Commercial Service’s (CCS) Dynamic Purchasing System (RM6219 Training and Learning) and also with numerous tender portals such as Ariba, Coupa and Delta E-Sourcing.

Read more...

Graduate Training Schemes

Framework Training has a strong track record of providing a solid introduction into the working world for technical graduates across myriad industries. We provide the opportunity to learn and gain valuable hands-on experience in a supportive, friendly and sociable training environment.

Attract & retain the brightest new starters

We know it is vital for our clients to invest in the future of their talented grads; not only to provide them with high-quality, professional training essential for their roles, but to embed them within the organisation’s culture and guide them on the right path to a successful career.

After all, your new hires could well be the next leaders and their creative ideas and unique insights are invaluable to your business.

Read more ...

Learning & Development

Our unique portfolio of high-quality technical courses and training programmes are industry-respected. They’re carefully designed so that delegates can seamlessly apply what they’ve learnt back in the workplace. Our team of domain experts, trainers, and support teams know our field — and all things tech — inside out, and we work hard to keep ourselves up to speed with the latest innovations. 

We’re proud to develop and deliver innovative learning solutions that actually work and make a tangible difference to your people and your business, driving through positive lasting change. Our training courses and programmes are human-centred. Everything we do is underpinned by our commitment to continuous improvement and learning and generally making things much better.

Read more...

Corporate & Volume Pricing

Whether you are looking to book multiple places on public scheduled courses (attended remotely or in our training centres in London) or planning private courses for a team within your organisation, we will be happy to discuss preferential pricing which maximise your staff education budget.

Enquire today about:

  • Training programme pricing models  

  • Multi-course voucher schemes

Read more...

Custom Learning Paths

We understand that your team training needs don't always fit into a "one size fits all" mould, and we're very happy to explore ways in which we can tailor a bespoke learning path to fit your learning needs.

Find out about how we can customise everything from short overviews, intensive workshops, and wider training programmes that give you coverage of the most relevant topics based on what your staff need to excel in their roles.

Read more...

Android and iOS App Security: Technical Analysis Techniques

Equip yourself with advanced iOS and Android app security analysis skills.

About the course

Mobile applications are complex software systems operating in potentially hostile environments, making their security analysis a critical skill for developers, security testers, and researchers. Beyond static code analysis, understanding how to reverse engineer compiled applications and perform dynamic analysis at runtime is essential for identifying hidden vulnerabilities, understanding application behaviour, and verifying security controls. This 4-day intensive hands-on training course provides participants with the fundamental knowledge and practical techniques required to conduct technical security analysis of mobile applications on both the Android and iOS platforms. The course focuses on understanding the underlying security architecture of each operating system and applying specific tools and methodologies for reverse engineering, static analysis, and dynamic testing.

The course is structured into distinct sections for Android and iOS, acknowledging the platform-specific nature of mobile security analysis. For Android, participants will begin by understanding the core security architecture, including software isolation, anti-exploitation mechanisms, and the structure of Android applications (APK file structure, Manifest, components like Activities, Services, Content Providers, and Receivers), along with interprocess communication and application signing. They will then learn techniques for Reverse Engineering Android Apps using industry-standard tools like JD-GUI and JADX to decompile and analyse bytecode. The Android section concludes with Dynamic Analysis, covering how to set up a mobile security lab, intercept network traffic, understand and bypass SSL pinning, bypass root detection, analyse sensitive data leakage via logs, exploit broadcasts, analyse local data storage, and find/exploit deeplinks.

For iOS, the course introduces the basics of iOS security, covering the platform overview, security architecture (code integrity, secure boot, pointers authentication code), signed system volume, and code signing. Participants will learn about setting up an iOS penetration testing lab, required testing tools, and the process of jailbreaking for enhanced access (while also discussing testing on non-jailbroken devices). Static Analysis techniques for iOS applications will be covered, including finding hardcoded sensitive information in app binaries. The iOS section then moves to Dynamic Testing, with an introduction to the powerful Frida framework. Participants will learn basics of jailbreaking, managing apps on iOS devices, bypassing jailbreak detection, intercepting network traffic (including bypassing certificate pinning), automation using tools like Objection, introduction to data storage and file system enumeration, finding credentials in Plist files and Keychain data storage, and an introduction to reverse engineering iOS apps with tools like Radare2. Through extensive hands-on labs and tool usage, attendees will gain practical experience in applying these techniques to real-world mobile applications.

Instructor-led online options are available - as part of a wider customised training programme, or as a standalone workshop.

    • Understand the fundamental security architecture and mechanisms of both the Android and iOS operating systems.
    • Explain the structure and components of Android and iOS applications and the role of application signing.
    • Set up a mobile security analysis lab environment for both Android and iOS.
    • Perform Reverse Engineering and Static Analysis on Android applications using tools like JD-GUI and JADX.
    • Perform Reverse Engineering and Static Analysis on iOS applications using relevant tools and techniques (e.g., analysing app binaries, Plist files).
    • Conduct Dynamic Analysis of Android applications, including intercepting network traffic, bypassing SSL pinning and root detection, and analysing runtime behaviour.
    • Conduct Dynamic Analysis of iOS applications, including setting up a testing environment, bypassing jailbreak detection and certificate pinning, and using tools like Frida and Objection.
    • Identify common mobile app vulnerabilities through reverse engineering, static analysis, and dynamic testing techniques on both platforms.
    • Understand and analyse mobile data storage mechanisms (local storage, Keychain) and identify potential data leakage risks.
    • Utilise specific tools and frameworks for mobile app security analysis on both Android (e.g., JD-GUI, JADX, Frida) and iOS (e.g., Frida, Objection, Radare2).
  • This 3-day intensive hands-on training course is designed for IT professionals who need to perform technical security analysis and testing of mobile applications on Android and iOS. It is ideal for:

    • Mobile Application Security Testers and Penetration Testers specialising in mobile.

    • Mobile Application Developers (for Android and iOS) who want to understand how their applications can be analysed and attacked, and how to identify vulnerabilities.

    • Security Analysts and Researchers interested in mobile application security.

    • Anyone involved in the security review or assessment of mobile applications.

    • Prior programming experience is recommended, although the course focuses on analysis rather than development.

    • Familiarity with mobile application concepts (how apps are installed and run).

    • Basic understanding of command-line interfaces.

    • Experience with either Android or iOS development is helpful but not strictly required.

    • Note: Participants will ideally have their own test devices (jailbroken/rooted and non-jailbroken/non-rooted) for hands-on labs, and will need the permissions to install specific software as per setup instructions provided before the course. We can provide access to a virtual environment if this is not possible, which may require remote desktop capabilities. Please get in touch for more details.

  • This Mobile app security analysis course is available for private / custom delivery for your team. Online instructor-led training will be delivered via MS Teams (or your own preferred platform).

    Get in touch to find out how we can deliver tailored training which focuses on your project requirements and learning goals.

  • Understanding Android Apps and Security Architecture

    • Understanding Android Architecture

    • Android System Security

    • Android Security Architecture

    • Android Security: Software Isolation

    • Android Security: Anti-Exploitation

    • Android APK File Structure

    • Understanding Android Manifest

    • Android App Components: Activity

    • Android App Components: Fragment

    • Android App Components: Content Providers

    • Android App Components: Service

    • Android Interprocess Communication

    • Android App Components: Receivers

    • Application Signing

    Reverse Engineering Android Apps

    • Getting Started with Reverse Engineering: Concepts and goals.

    • Reverse Engineering with JD-GUI (Java Decompiler GUI).

    • Reverse Engineering with JADX (DEX to Java Decompiler).

    • Analysing decompiled code and resources.

    Dynamic Analysis of Android Apps

    • Setting up Android security lab (Tools, environment).

    • Dynamic Analysis of Android apps: Concepts and techniques.

    • Intercepting Network Traffic (e.g., using Burp Suite, mitmproxy).

    • Understanding SSL Pinning.

    • Deciphering SSL Pinning Implementation in Android apps.

    • Bypassing SSL Pinning with Frida.

    • Bypassing Root Detection.

    • Sensitive Data Leakage via Logs.

    • Exploiting Broadcasts.

    • Local Data Storage Analysis (Shared Preferences, Databases, Files).

    • Finding & Exploiting Deeplinks.

    Basics of iOS Security and Architecture

    • Setting Up iOS Penetration Testing Lab (Tools, environment).

    • iOS Platform Overview.

    • Understanding iOS Security Architecture.

    • Code Integrity in iOS.

    • Understanding iOS concepts: Fast Permission Restrictions, Pointers Authentication Code, Secure Boot Process.

    • Basics iOS Security Architecture (Revisited).

    • Revisiting Signed System Volume and Code Signing.

    • Required Tools for Testing.

    • Jailbreaking Device and Shell Access (Understanding the process and implications).

    • Pentesting on Non-Jailbroken Devices (Limitations and possibilities).

    • Mobile Provisioning: Creating Sample App Using Xcode (for testing purposes).

    • Managing Apps on iOS Device.

    Static Analysis of iOS Applications

    • Static Analysis of iOS applications: Concepts and techniques.

    • Finding Hard Coded sensitive info in app binary (e.g., strings, API keys).

    • Analysing Plist Files for configuration and potential secrets.

    Introduction to Frida and Dynamic Testing on iOS

    • Introduction to Frida and Dynamic Testing: Concepts and capabilities.

    • Basics of Jailbreaking (Revisited for context).

    • Bypassing Jailbreak detection in iOS.

    • Intercepting Network Traffic in iOS apps.

    • Bypassing Certificate pinning.

    • Automation Using Objection (Frida-based tool).

    • Introduction to Data Storage and File System Enumeration.

    • Finding Credentials in Plist Files (Revisited dynamically).

    • Keychain Data Storage (Accessing and analysing Keychain data).

    • Reverse Engineering iOS apps with Radare2 (Introduction to binary analysis).

Trusted by

IBM company logo CAPITA company logo

Public Courses Dates and Rates

Please get in touch for pricing and availability.

Related courses