HOME > IT & Software > Mobile Security- Reverse Engineer Android Apps From Scratch

Mobile Security- Reverse Engineer Android Apps From Scratch

SynopsisMobile Security: Reverse Engineer Android Apps From Scratch,...
Mobile Security- Reverse Engineer Android Apps From Scratch  No.1

Mobile Security: Reverse Engineer Android Apps From Scratch, available at $54.99, has an average rating of 4.5, with 46 lectures, 1 quizzes, based on 724 reviews, and has 35880 subscribers.

You will learn about Android Malware Reverse Engineering How to Create a Ransomware Decryption Tool Mobile Security Static Analysis Dynamic Analysis Android App development fundamentals This course is ideal for individuals who are Students interested in Cyber Security and Android Reverse Engineering It is particularly useful for Students interested in Cyber Security and Android Reverse Engineering.

Enroll now: Mobile Security: Reverse Engineer Android Apps From Scratch

Summary

Title: Mobile Security: Reverse Engineer Android Apps From Scratch

Price: $54.99

Average Rating: 4.5

Number of Lectures: 46

Number of Quizzes: 1

Number of Published Lectures: 46

Number of Published Quizzes: 1

Number of Curriculum Items: 47

Number of Published Curriculum Objects: 47

Original Price: $59.99

Quality Status: approved

Status: Live

What You Will Learn

  • Android Malware Reverse Engineering
  • How to Create a Ransomware Decryption Tool
  • Mobile Security
  • Static Analysis
  • Dynamic Analysis
  • Android App development fundamentals
  • Who Should Attend

  • Students interested in Cyber Security and Android Reverse Engineering
  • Target Audiences

  • Students interested in Cyber Security and Android Reverse Engineering
  • This is an introductory course suitable for cyber security newcomers as well as cyber security professionals who would like to dive into the world of mobile security.

    In recent years, Android has established itself as a leader in the mobile OS market. For this reason, it is a common target of abuse among cyber-criminals.

    This course will provide students with the ability to set up an analysis environment, allowing them to analyse suspicious Android apps and determine whether or not they are malicious. The syllabus assumes that the student has little or no knowledge of Android security. It therefore provides the fundamentals not only on Android security, but on Android applications in general.

    The course will take students through the process of developing a basic Android application, which will provide insight into the inner workings of an Android APK. Upon completion, students will have their own analysis environment along with the knowledge required to analyse suspicious APKs.

    Course outline:

    -Course Requirements

    -Intro to Android

    -Course/Lab Setup

    -Developing a Basic Android App

    -Analyzing Android Apps

    -Case Study: Analyzing an actual ransomware and developing a decryption tool

    Course Curriculum

    Chapter 1: Course prerequisites

    Lecture 1: Course overview

    Lecture 2: Course prerequisites

    Chapter 2: Intro to Android

    Lecture 1: Section 2

    Lecture 2: Intro to Android

    Chapter 3: Course/Lab setup

    Lecture 1: Section 3

    Lecture 2: Android Studio

    Lecture 3: SDK Manager

    Lecture 4: Emulator

    Lecture 5: ADB

    Lecture 6: Apktool

    Lecture 7: JD-GUI/Enjarify

    Lecture 8: Bytecodeviewer

    Lecture 9: Androguard

    Lecture 10: Objection

    Lecture 11: Tamer

    Lecture 12: Recap

    Chapter 4: Developing a basic Android App

    Lecture 1: Section 4

    Lecture 2: Android App Structure and components

    Lecture 3: Simple UI i

    Lecture 4: Simple UI ii

    Lecture 5: Simple UI iii

    Lecture 6: App Components: Activity i

    Lecture 7: App Components: Activity ii

    Lecture 8: App Components: Content Provider

    Lecture 9: App Components: Broadcast Receiver i

    Lecture 10: App Components: Broadcast Receiver ii

    Lecture 11: App Components: Service i

    Lecture 12: App Components: Service ii

    Lecture 13: Recap

    Chapter 5: Analyzing Android Apps

    Lecture 1: Section 5

    Lecture 2: Static vs Dynamic vs Automated Analysis

    Lecture 3: ADB

    Lecture 4: Static Analysis: APKtool

    Lecture 5: Static Analysis: Bytecodeviewer

    Lecture 6: Static Analysis: Androguard

    Lecture 7: Dynamic Analysis: Objection

    Lecture 8: Automated Analysis: Malware Sandbox i

    Lecture 9: Automated Analysis: Malware Sandbox ii

    Lecture 10: Recap

    Chapter 6: Case study: Analyzing real ransomware and developing a decryption tool

    Lecture 1: Section 6

    Lecture 2: Simplocker: Automated Analysis

    Lecture 3: Simplocker: Running on Emulator

    Lecture 4: Simplocker: Static Analysis

    Lecture 5: Simplocker: Decryption Tool

    Lecture 6: Recap

    Lecture 7: Thank you

    Instructors

  • Mobile Security- Reverse Engineer Android Apps From Scratch  No.2
    Flip Cortex
    Provider of ethical hacking and cyber security trainings
  • Rating Distribution

  • 1 stars: 6 votes
  • 2 stars: 13 votes
  • 3 stars: 74 votes
  • 4 stars: 269 votes
  • 5 stars: 362 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!