{"id":10607,"date":"2024-07-02T14:53:27","date_gmt":"2024-07-02T12:53:27","guid":{"rendered":"https:\/\/cyberacademy.altaydagistan.com\/?post_type=mec-events&#038;p=10607"},"modified":"2026-03-02T17:06:05","modified_gmt":"2026-03-02T16:06:05","slug":"audit-securite-dapplications-mobiles-android-advanced","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/audit-securite-dapplications-mobiles-android-advanced\/","title":{"rendered":"Security audit of Android mobile applications - Advanced"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"10607\" class=\"elementor elementor-10607\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32887ac4 elementor-widget elementor-widget-text-editor\" data-id=\"32887ac4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Get the latest expoitation techniques for Android mobile applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad7b056 elementor-widget elementor-widget-heading\" data-id=\"4ad7b056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The target audience for training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"list-none\"><li>Security Consultant<\/li><li>System or network administrators<\/li><li>Developers<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d6e3ac1 e-flex e-con-boxed e-con e-child\" data-id=\"5d6e3ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What you will learn<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whether you're a technical auditor or a developer, you need to be aware of bad security practices and exploitation techniques. Come and learn more about the vulnerabilities associated with this platform in this training course!<\/p><p>This course will show you advanced auditing methods for Android mobile applications.<\/p><p>The aim of the course is to go beyond the \"Introduction\" course. The course is entirely practical.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71419de5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"71419de5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca12bed elementor-widget elementor-widget-heading\" data-id=\"1ca12bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training programme <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10905e70 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10905e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration: 2 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df30182 elementor-widget elementor-widget-text-editor\" data-id=\"df30182\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Day 1 :<\/b> Advanced static analysis, advanced network analysis, advanced dynamic analysis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-887e7e0 elementor-widget elementor-widget-text-editor\" data-id=\"887e7e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Day 2 :<\/b>\u00a0<span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-style: var( --e-global-typography-text-font-style ); letter-spacing: var( --e-global-typography-text-letter-spacing ); text-transform: var( --e-global-typography-text-text-transform ); text-align: var(--text-align); background-color: var( --e-global-color-c696dce );\">Signature and reverse application, Frida \/ Objection, Metasploit, Forensic.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training objectives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Master the latest operating techniques for Android mobile applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training prerequisites<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae18b01 elementor-widget elementor-widget-text-editor\" data-id=\"ae18b01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No pre-requisites are required to take part in this course.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aaaf1ef e-con-full e-flex e-con e-parent\" data-id=\"aaaf1ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d37df5 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8d37df5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/03\/Audit-securite-dapplications-mobiles-Android-\u2013-Advanced.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">See the brochure for this course<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Obtenez les derni\u00e8res techniques d&rsquo;expoitation pour les applications mobiles Android. L&rsquo; audience cibl\u00e9e par la formation Consultant en s\u00e9curit\u00e9 Administrateurs syst\u00e8me ou r\u00e9seau D\u00e9veloppeurs Ce que vous allez apprendre Que vous soyez auditeur technique ou bien d\u00e9veloppeur, la connaissance des mauvaises pratiques de s\u00e9curit\u00e9 ainsi que les techniques d&rsquo;exploitation est n\u00e9cessaire,\u00a0Venez approfondir vos connaissances sur [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":10596,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[92],"duree":[154],"examen":[160],"langue":[144],"niveau":[85],"formateur":[100],"cpf":[],"organismes":[],"organisme":[],"mec_category":[101],"class_list":["post-10607","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-non","duree-2-jours","examen-non","langue-francais","niveau-avance","formateur-acg-cyberacademy","mec_category-securite-technique"],"acf":{"taux_davis_etoile":4.9,"taux_de_reussite":4.9,"formation_populaire":false,"lien_guide_dexamen":"","liste_importance_formations":10},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Audit s\u00e9curit\u00e9 d&#039;applications mobiles Android - Advanced - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Approfondissez vos comp\u00e9tences en audit de s\u00e9curit\u00e9 Android et ma\u00eetrisez les techniques avanc\u00e9es pour d\u00e9tecter et exploiter les vuln\u00e9rabilit\u00e9s mobiles.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/audit-securite-dapplications-mobiles-android-advanced\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Audit s\u00e9curit\u00e9 d&#039;applications mobiles Android - Advanced - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Approfondissez vos comp\u00e9tences en audit de s\u00e9curit\u00e9 Android et ma\u00eetrisez les techniques avanc\u00e9es pour d\u00e9tecter et exploiter les vuln\u00e9rabilit\u00e9s mobiles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/audit-securite-dapplications-mobiles-android-advanced\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-02T16:06:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Audit_securite_dapplications_mobiles_Android-_Advanced_1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/audit-securite-dapplications-mobiles-android-advanced\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/audit-securite-dapplications-mobiles-android-advanced\\\/\",\"name\":\"Audit s\u00e9curit\u00e9 d'applications mobiles Android - Advanced - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/audit-securite-dapplications-mobiles-android-advanced\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/audit-securite-dapplications-mobiles-android-advanced\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Audit_securite_dapplications_mobiles_Android-_Advanced_1-scaled.jpg\",\"datePublished\":\"2024-07-02T12:53:27+00:00\",\"dateModified\":\"2026-03-02T16:06:05+00:00\",\"description\":\"Approfondissez vos comp\u00e9tences en audit de s\u00e9curit\u00e9 Android et ma\u00eetrisez les techniques avanc\u00e9es pour d\u00e9tecter et exploiter les vuln\u00e9rabilit\u00e9s mobiles.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/audit-securite-dapplications-mobiles-android-advanced\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/audit-securite-dapplications-mobiles-android-advanced\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/audit-securite-dapplications-mobiles-android-advanced\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Audit_securite_dapplications_mobiles_Android-_Advanced_1-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Audit_securite_dapplications_mobiles_Android-_Advanced_1-scaled.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Approfondissez vos comp\u00e9tences en audit de s\u00e9curit\u00e9 Android et ma\u00eetrisez les techniques avanc\u00e9es pour d\u00e9tecter et exploiter les vuln\u00e9rabilit\u00e9s mobiles.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/audit-securite-dapplications-mobiles-android-advanced\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Audit s\u00e9curit\u00e9 d&#8217;applications mobiles Android &#8211; Advanced\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Audit s\u00e9curit\u00e9 d'applications mobiles Android - Advanced - ACG CyberAcademy","description":"Approfondissez vos comp\u00e9tences en audit de s\u00e9curit\u00e9 Android et ma\u00eetrisez les techniques avanc\u00e9es pour d\u00e9tecter et exploiter les vuln\u00e9rabilit\u00e9s mobiles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/audit-securite-dapplications-mobiles-android-advanced\/","og_locale":"en_GB","og_type":"article","og_title":"Audit s\u00e9curit\u00e9 d'applications mobiles Android - Advanced - ACG CyberAcademy","og_description":"Approfondissez vos comp\u00e9tences en audit de s\u00e9curit\u00e9 Android et ma\u00eetrisez les techniques avanc\u00e9es pour d\u00e9tecter et exploiter les vuln\u00e9rabilit\u00e9s mobiles.","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/audit-securite-dapplications-mobiles-android-advanced\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-03-02T16:06:05+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Audit_securite_dapplications_mobiles_Android-_Advanced_1-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/audit-securite-dapplications-mobiles-android-advanced\/","url":"https:\/\/acgcyberacademy.fr\/events\/audit-securite-dapplications-mobiles-android-advanced\/","name":"Audit s\u00e9curit\u00e9 d'applications mobiles Android - Advanced - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/audit-securite-dapplications-mobiles-android-advanced\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/audit-securite-dapplications-mobiles-android-advanced\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Audit_securite_dapplications_mobiles_Android-_Advanced_1-scaled.jpg","datePublished":"2024-07-02T12:53:27+00:00","dateModified":"2026-03-02T16:06:05+00:00","description":"Approfondissez vos comp\u00e9tences en audit de s\u00e9curit\u00e9 Android et ma\u00eetrisez les techniques avanc\u00e9es pour d\u00e9tecter et exploiter les vuln\u00e9rabilit\u00e9s mobiles.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/audit-securite-dapplications-mobiles-android-advanced\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/audit-securite-dapplications-mobiles-android-advanced\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/audit-securite-dapplications-mobiles-android-advanced\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Audit_securite_dapplications_mobiles_Android-_Advanced_1-scaled.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Audit_securite_dapplications_mobiles_Android-_Advanced_1-scaled.jpg","width":1920,"height":1280,"caption":"Approfondissez vos comp\u00e9tences en audit de s\u00e9curit\u00e9 Android et ma\u00eetrisez les techniques avanc\u00e9es pour d\u00e9tecter et exploiter les vuln\u00e9rabilit\u00e9s mobiles."},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/audit-securite-dapplications-mobiles-android-advanced\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"Audit s\u00e9curit\u00e9 d&#8217;applications mobiles Android &#8211; Advanced"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/10607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=10607"}],"version-history":[{"count":16,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/10607\/revisions"}],"predecessor-version":[{"id":22602,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/10607\/revisions\/22602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/10596"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=10607"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=10607"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=10607"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=10607"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=10607"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=10607"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=10607"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=10607"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=10607"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=10607"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=10607"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=10607"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=10607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}