Hands-on Android Security
Course Description
Enhancing the worldwide digital landscape with millions of applications and users, Android is a dominant mobile operating system. But with more users, devices and apps comes an increased chance of security threats and breaches. This free course on Android security focuses on the vital aspect of pentesting to detect vulnerabilities and solve any weaknesses within the system.
The material is solidly focused on the practical aspects of penetration testing or ‘ethical hacking’, as it is sometimes referred to. The course starts by grounding you in the core concepts of the Android operating systems as a whole, including its hardware security components and native applications. You will also learn how to analyze existing Android application, understand potential vulnerabilities or weak points, and test your work to ensure a totally secure environment to ward off unwanted cybersecurity attacks.
Practically, you will master how install and set up Android emulators (software applications that allow you to imitate and use your mobile device natively on your PC) and see how they are used for debugging. Then, see how to ‘attack’ an Android platform to protect it, as well as how to generate .APK files to distribute apps on Android’s operating system. You will see how to use a pentesting framework to do this. Finally, the material discusses different techniques for dealing with and reversing malware. This is course is essential for developers of Android apps and those who are interested in improving mobile security.
What you'll learn in this course?
-
Technology
-
Cybersecurity
-
Information Security
-
Android
-
Penetration Testing
Course Curriculum
- Learning Outcomes
- Attack Surface
- Penetration Testing Android Applications Part 1
- Penetration Testing Android Applications Part 2
- Penetration Testing Android Applications Part 3
- Installing and Using Android Penetration Testing Framework
- Create Malicious Apk Files for Penetration Testing
- Lesson Summary
- Learning Outcomes
- Reversing and Creating Android Malware
- Using Static Analysis for Reversing Android Malware Part 1
- Using Static Analysis for Reversing Android Malware Part 2
- Using Dynamic Analysis for Reversing Android Malware
- Creating an Android Malware from Scratch Part 1
- Creating an Android Malware from Scratch Part 2
- Creating an Android Malware from Scratch Part 3
- Next Step
- Hands-on Android Security - Course Summary
- Lesson Summary
EC-Council Learning
New Mexico, USA
By