Still Have Questions?

Welcome to the 8kSec Academy FAQ page. Here, we answer the most common questions about our courses, enrollment, and learning platform. We’re committed to helping you up-skill in cybersecurity and make the most of your learning experience.

Course Overview & Prerequisites

Where can I learn more about the courses, and what will I learn? 

You can learn more our courses on the individual course pages. Here are the links that will help you out:

Who should attend the course? Is it suitable for beginners?

Our courses are designed for developers, security consultants, penetration testers, vulnerability researchers, and security enthusiasts who want to deepen their mobile security skills. Visit the individual course pages for specific information, but for most of our courses no extensive prior mobile hacking experience is required.

Our courses start with foundational concepts and then progresses to advanced techniques, so it accommodates various skill levels. Beginners who have a basic software and cybersecurity background will find the course accessible, while experienced professionals will discover advanced tips and techniques.

What are the prerequisites for enrolling in the course?

To get the most out of the courses, you should meet a few prerequisites:

  • Cybersecurity/Pentesting Basics: A working knowledge of general cybersecurity and penetration testing fundamentals
  • Mobile OS Basics: Basic familiarity with iOS and/or Android platforms (how apps are installed, common terminologies, etc.)
  • Linux & Command Line: Basic Linux skills and comfort with command-line usage
  • Programming Knowledge: Understanding of fundamental programming concepts (variables, loops, etc.) in at least one high-level language like Java, Kotlin, Objective-C, Swift, C/C++, etc.
  • (Recommended) Assembly Basics: Some basic exposure to ARM/AArch64 assembly is a plus (helpful for low-level reverse engineering), but it’s not required to complete the courses


These prerequisites ensure you can follow along with the course and hands-on labs. However, our courses do review necessary concepts, so even if you’re not an expert in all these areas, you can catch up as you go.

It is important to note that the prerequisites differ for each course, please refer to the Prerequisites section on the Course page.

Enrollment & Access

When does the course access start, and how long will I have access to the course materials?

Your course access starts immediately once you purchase the on-demand course. When you enroll in the course, you get 365 days of access to all the video lectures, and materials from the date of purchase. This one-year access lets you learn at your own pace and revisit the content as needed.

How do I enroll in the course and what does the course fee include?

Enrolling is straightforward: just sign up on the 8kSec Academy website and purchase the On-Demand course of your choice. Once you register and complete the payment, you get instant access to the course materials. The course fees includes the full 1-year access and one certification exam attempt.
Payment can be made via the online platform using major credit/debit cards/Paypal, and some other methods. After purchase, you’ll have immediate access to start learning at your own pace.

Are there any discounts available?

Yes! We occasionally run promotions that are valid for a limited time, so be sure to check our course pricing page to see if any current discounts are available.
We also offer the following discounts:
College/ High School Student Discount:
  • 15% off for eligible students

Group Enrollment Discounts:
  • 5 – 10 students: 10% discount
  • 11 – 20 students: 15% discount
  • 21+ students: 20% discount

Follow our newsletter at https://8ksec.io/ to get up to date information about our latest promotions. For more details or to apply for a discount, please reach out to us at support@8ksec.io.

Can I pay for the course in installments?

Depending on your country, you may be able to split payments. We integrate with Afterpay and Klarna, both of which offer flexible payment plans, including interest-free installments and pay later options.

What should I do if my payment did not go through?

We apologize for the inconvenience. We recommend reaching out to your financial institution, as they can help identify the issue and may need to grant additional permissions to complete the payment. If you need further assistance, feel free to contact us at support@8ksec.io.

Do you accept cryptocurrency as a payment method?

Currently, we do not accept cryptocurrency as a payment option.

Can I get a refund for any reason?

Unfortunately, we do not offer refunds once a course has been purchased. However, we strive to ensure that our courses provide exceptional value, and we encourage you to review the course details thoroughly before enrolling. Each course provides a detailed syllabus and even a justification letter for your manager to help you make an informed decision. We highly encourage you to go through the sample videos we have posted for each of the courses to get more understanding of the course delivery.


If you have questions about the course content or whether it’s right for you, it’s a good idea to reach out to us at support@8ksec.io before purchasing for any clarification.

Technical Requirements

What are the technical requirements to participate in the course?

It is important to note that the Technical Requirements differ for each course, please refer to the Technical Requirements section on the Course page. However, as an example, To fully engage with the course and complete the hands-on labs for a course covering both iOS & Android, you will need a suitable computer and mobile devices or emulators for testing:

  • PC/Laptop: A computer with at least 8 GB of RAM and adequate space for installing tools, VMs, and storing course files. You should have administrative/root privileges on this machine to install software and run certain tools. Our course content and tools are compatible with common operating systems (Windows, Linux, macOS), so you can use the OS of your choice, as long as it supports the required tools mentioned in the individual courses.
  • iOS Device or VM: For iOS-related labs, you’ll need access to a jailbroken iOS device (iPhone/iPad) running iOS 16.x or later, or use a virtual iOS environment. Many students use platforms like Corellium (a virtualized iOS environment) if they don’t have a physical jailbroken device. The course provides guidance on setting up a lab using a jailbroken device or Corellium.
  • Android Device or Emulator: For Android labs, you should have a rooted Android device running Android 12.x or later, or use an Android emulator/virtual device with root capabilities. You can use common emulators (AVD, Genymotion) or services like Corellium for Android as well. Root access is needed to fully explore certain app vulnerabilities. The course provides guidance on setting up a lab using a rooted device, emulators, and Corellium.
  • Stable Internet: Since this is an online course with video lectures and downloads, a reliable internet connection is needed to stream content and download any provided lab files or tools.
  • Required Tools: The course will utilize tools such as Ghidra (reverse engineering), Frida (dynamic instrumentation), LLDB (debugger), Hopper (disassembler), Burp Suite (for intercepting traffic), etc. You’ll be guided on installing and using these tools as part of the course.

Labs & Practical Exercises

Does the course include hands-on labs and practical exercises?

Absolutely! Practical, hands-on learning is the core focus of all of our courses. The modules includes exercises where you apply the concepts immediately, ensuring you gain real-world experience. For example, when you learn about a particular mobile vulnerability, the course provides a demo app that you can use to practice exploiting that issue in a environment you can control. You can choose run the mobile binaries on emulators, physical devices, or on Corellium - it is up to you. In addition to real world applications, the instructors have created proof-of-concept mobile applications, and scripts specifically for the course, allowing you to learn application and OS internals. These exercises cover real vulnerability categories on Android and iOS similar to those found in OWASP Mobile Top 10, and more.


The modules are designed to be as close as possible to real-world pentesting scenarios: you might be intercepting an app’s network traffic to find sensitive data, bypassing jailbreak detection in an iOS app, or using Frida to hook into a running process and manipulate its behavior. These are all tasks you would do in a professional mobile security assessment, or during security research. By working through these practical exercises, you’ll not only understand the theory but also build muscle-memory with the tools and techniques used by experts.

How are the labs conducted in an on-demand format?

Since our courses are in on-demand format, you will conduct labs on your own system, but with plenty of guidance. The course provides detailed lab setup instructions so you can configure your environment (device or emulator) for testing. When it’s time to do a lab, you’ll watch a demonstration or follow written steps, and then attempt the exercise yourself. You will be provided with the relevant binaries and scripts as digital downloads along with each of the modules as needed. You can use them to setup your local lab environment well.


There are also self-assessment quizzes and exercises after certain sections to help you verify that you understood the key points and successfully completed the tasks.


It’s up to you when to do the labs! You can pause the video, try the lab exercise, and resume when ready. All necessary files (such as vulnerable app APKs/IPAs or scripts) are provided for download as part of the course. If you run into issues, you can ask for help to the instructors using the course dashboard or over email. Because you have 1-year access, you can redo the labs as needed; this repeatability allows you to truly master the techniques. By the end, you’ll have had substantial hands-on practice equivalent to a real-world mobile app penetration test.

Certification & Career Benefits

Do I receive a exam certificate or certification upon course completion?

Yes. Upon successfully completing all course modules, you will receive a Certificate of Course Completion to recognize that you finished the training. Additionally, our courses includes one attempt at our 8kSec certification exam assigned for the course. That means after training, you can choose to challenge the exam to earn an industry-recognized certification.


The course completion certificate is awarded for going through the content, whereas the exam certification is awarded only if you pass the rigorous exam (demonstrating your skills). Both are valuable – the completion certificate shows you invested in upskilling, and the exam certification proves you can apply the knowledge in practice. For exam completion, we issue a digital certification badge (through Credly) when you achieve the exam certification, which you can share on LinkedIn or your resume to showcase your credential.


Our certifications are well-regarded and shows employers that you have hands-on skills in mobile app security, beyond just theoretical knowledge.

What is the certification exam process and format?

Each of our exams are practical, scenario-based exam designed to test the skills you learned. It is an live-online exam (no need to go to a test center) that you can book using the “Schedule Exam” section of your accessible course.


Here are some more details about our certification exam process:

  • Thirty minutes before your scheduled exam time, you will receive an email containing the exam package, which includes instructions on the scope of engagement and the specific challenges you must solve. You will also receive access to the Corellium credentials that you can use to access the target exam iOS and Android devices.
  • You will have 24 or 48 hours depending on the certification exam from the start of your exam to complete all provided challenges.
  • For example, if your exam begins at 11:00 AM EST on March 21, 2025 and if the exam duration is 48 hours, it will conclude exactly 48 hours later, at 11:00 AM EST on March 23, 2025.
  • After this period, you will have an additional 24 hours to finalize and submit all required deliverables, including your documentation, Proof of Concept (PoC), and final report.
  • Each challenge in your exam will have specific points assigned to it. To pass the certification exam, you must score at least 70 out of 100 points. This makes it crucial to manage your time effectively and ensure that all your solutions are well-documented to maximize your score.
  • Submission instructions will be included in your exam package.


It’s an open-book format so you can use your tools, notes, and the internet – because the goal is to simulate a real pentest, not a memory test. You will create a detailed report of the vulnerabilities you discovered and how you exploited them just like a professional pentest report.

You can find full details about the exam registration process in the final module of the course.

What happens if I don’t pass the certification exam on my first attempt? Can I retake it?

Yes! Your course fee includes one attempt at the certification exam. If you don’t pass on your first try, you can purchase a retake for an additional USD $99.


To schedule your exam retake or buy additional attempts, simply contact our support team at support@8ksec.io, and we’d be happy to assist you.

Is the certification recognized in the industry, and how will it benefit my career?

Yes, our certifications are a valuable credential in the cybersecurity industry. Earning the certification demonstrates that you can confidently assess mobile apps for security issues and implement defenses, which is a niche and in-demand skill set. Mobile security expertise is increasingly sought after as companies become more mobile-first. By adding our certifications to your resume, you showcase yourself as a specialist capable of securing mobile applications at a deep level, which can set you apart in job interviews.


Career-wise, this course and certification can open doors to roles like Mobile Application Penetration Tester, Mobile Security Engineer, Security Consultant, or Mobile Vulnerability Researcher. Companies such as financial institutions, tech firms, and security consultancies look for professionals with this kind of hands-on mobile security experience. Senior mobile security roles often command high salaries (e.g., a Lead Mobile App Penetration Tester role can list $150,000–$180,000 per year in the US). The skills you gain are directly applicable to such jobs – for instance, you might be testing banking apps for security flaws or helping develop more secure mobile SDKs.


Beyond the certification itself, the knowledge you acquire like reversing apps, understanding iOS/Android internals, using tools like Frida are highly transferable. Many alumni of this course use their new skills to advance in their current jobs or to pivot into specialized security teams focusing on mobile.

Post-Course Support & Next Steps

What kind of support is available during and after the course?

Our team strives to provides robust support to ensure you succeed in the course. As an enrolled student, you’ll have access to our support team and instructors for any questions or technical issues you encounter. You can reach out to the instructors using the course dashboard or over email and expect guidance from them.


The support isn’t limited to just the duration of the course videos; you can engage with us anytime after your 365-day access period, and we’d be happy to answer any questions.

Will I receive course updates or new content as the mobile security landscape evolves?

Yes, one of the advantages of the on-demand platform is that course content can be updated, and you will receive those updates during your access period. Our instructors continuously refine and improve the material based on real-world developments and student feedback. If new mobile threats emerge or better tools become available, the course creators will likely add or update lessons to cover those. All such updates automatically become available to enrolled students. For example, we recently added a recently disclosed CVE modules to our courses so that our readers are informed about updated content, and testing techniques. You won’t have to purchase anything extra – these enhancements are part of the course you already bought.

Furthermore, at 8kSec Academy our philosophy is to keep training content practical and up-to-date. The content in this course has been proven in live trainings with thousands of students and is kept current with the latest techniques. Rest assured that throughout your 1-year access, you’ll be learning the state-of-the-art in mobile application security and internals content. We encourage you to periodically check the course dashboard for any “new” or “updated” tags on modules, so you don’t miss newly added content.

Are there resources for further learning or advanced courses after I finish one of the courses?

Definitely We provided courses for all skill levels. For example, the Practical Mobile Application Exploitation course is part of a broader curriculum offered by 8kSec Academy, and there are several paths you can take after completing it. If you want to specialize further, we provide advanced courses focusing on specific areas of mobile and exploitation. For instance, we offer the Offensive Mobile Reversing and Exploitation training which goes deeper into iOS/Android internals. Alternatively if you are interested in ramping up on internals for specific mobile operations systems, then you can choose from our Offensive Android Internals or Offensive iOS Internals courses. These courses can build on the foundation you gained and take your skills to the next level.

In addition to formal courses, we often shares knowledge via blogs (https://8ksec.io/blog) and public events (https://8ksec.io/public-training/). We encourage you to join our newsletter or follow our blog and social media for free resources, articles, and announcements of new training sessions.

More Questions?

Who should I contact if I have additional questions?

For any additional questions, please contact our support team at support@8ksec.io.

Our courses