A practical guide focused on helping cybersecurity professionals scale up their mobile security skills. Looking at how the IT world has evolved with the pandemic, mobile devices have become the paramount targets for cybercriminals. This book starts with the basics of reverse engineering and how to set up an isolated virtual machine environment to perform reverse engineering. Youll then learn about modern tools such as Ghidra, Hopper, and more to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed.