Android Hacking And Penetration Testing
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Android Hacking and Penetration Testing course is a highly practical and hands on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, You will learn various topics such as Android architecture, Android security model, Android Application Pentesting and Exploitation, Reversing Android applications, static and dynamic analysis of android malware etc. After finishing this course you will be able to perform a Penetration test on a given Android device and its applications
Course Instructors :-
Srinivas is one of the Founders of JSinfosec. He is a Cyber Security Enthusiast, writer and a Speaker. He is one the coauthors of the book "Hacking S3rets", He is an active member of Null Hyderabad. His area of Interests Include Web Application Pentesting, Android application Fuzzing and Pentesting.
John is one of the founders of JSinfosec. He is an Infosec researcher, Freelance Pen tester and a blogger. He has more than 5 Years of experience in the field of Information Security. His area of Interests Include Wireless Security and Penetration Testing, Android Security & Forensics
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction|
Introduction To The CoursePreview
About the Instructors
Need For Mobile Security And Owasp Top 10 Mobile Risks
|Section 2: Lab Setup For The Course|
Installing Ubuntu On VMware
Setting Up An Android Pen-testing Environment on UbuntuPreview
|Section 3: Getting Familiar With Android Developer Tools|
Android Debug Bridge
|Section 4: Android Architecture And Security Model|
A Brief Intro to Android
Android booting process
Android Data Structures and File Systems
Android Security Model
|Section 5: Interacting With an Android Device|
Difference Between Android Emulator & Android Device
Interacting With Android device Via Usb
All About Rooting
|Section 6: Android Network Analysis|
Setting Up A Proxy for Android Emulator
Setting Up A Proxy for Android Device
Installing CA certificate
Real World MITM and SSL MITM Attacks Part-1
Real World MITM and SSL MITM Attacks Part -2
|Section 7: Android Reversing and Malware Analysis|
Apk files in a nutshell
Introduction to Reverse Engineering
Reversing to get Source Code of Android Apps
Reverse Engineering with APKTOOL
Introduction to Android Malwares
Dynamic Vs Static Analysis
Static analysis of Android Malwares
Dynamic analysis of Android Malwares
Introduction to Android Tamer
Dynamic Analysis with DroidBox
|Section 8: Android Application Pen testing and Exploitation|
Installing JSinfosec Vulnerable Apps
Introduction to Android App pentesting
Fuzzing Android Apps with Burp - Proxy
Fuzzing Android Apps with Burp - Intruder
Content Provider Leakage
Client Side Injection
Insecure Data Storage - Shared Preferences
Insecure Data Storage - SQLite Databases
Unintended Data Leakage
Automated Security Assessments with Drozer
Exploiting Android Devices Using Metasploit
|Section 9: Android Device And Data Security|
Android Device Protection
Bypassing Android Locks
Android Data Extraction
|Section 10: Using Android as a Pen testing Platform|
A Look Into Commonly Used Pen testing and Hacking Apps
PWN Pad on Nexus 7
Kali Linux on Android
|Section 11: Conclusion And Road Ahead|
Mobile Pen-testing Check List
Android Security Practices
Course Summary And Revision
Jsinfosec - Cyber Security website which offers Info-sec training , Pen-testing/Hacking tips, Security News and more.....
We provide high quality training's on Information Security to both students and working professionals , Our instructors are well experienced and qualified in their fields ,Our instructors have published numerous articles , white papers in various international online magazines . Our Instructors have reported vulnerabilities in numerous big websites and helped their organizations to secure them . We provide live and online Info-sec training's at very cheap and affordable price . Our courses are comprehensive and highly hands-on. our aim is to make info sec learning an enjoyable experience
Learn More About Us