Android Malware Analysis - From Zero to Hero
What you'll learn
- Perform static malware analysis
- Perform dynamic malware analysis
- Detect malicious and data exfiltration code
- Reverse engineer APKs
- Understand Android security architecture
- Understand Android attack surface
Requirements
- Programming experience, mainly Java and XML
- Familiar with Kali Linux
- Basic cybersecurity knowledge
- Interest in malware analysis
Description
The rise of mobile devices has made them an integral part of our daily lives and routines. Over the last few years, their use has grown tremendously, to the point where they are now ubiquitous. This widespread use of mobile devices has also led to a corresponding increase in the number of malicious mobile applications.
In the field of cybersecurity, it is crucial to expand one's skillset to include understanding and analyzing mobile malware. With mobile devices becoming increasingly central to our personal and professional lives, it is more important than ever to be able to identify and mitigate threats to our mobile security.
This is where the course on how to reverse engineer Android mobile applications and understand their components comes in. The course provides a comprehensive guide to Android security, starting with a quick introduction before diving into the major mobile attack vectors. Participants will then learn how to set up a Kali lab with all the necessary tools before getting hands-on with the process of decompiling and decoding APK files to perform static analysis.
The course also covers dynamic analysis, using android applications with live malware to demonstrate how to identify and mitigate malicious behavior. By the end of the course, participants will be confident in their ability to utilize Kali tools to spot any data exfiltration or malicious behavior of Android applications.
In today's rapidly evolving threat landscape, the ability to analyze mobile malware is an essential skill for any cybersecurity professional. With this course, participants will gain a comprehensive understanding of the components of Android applications, as well as the tools and techniques necessary to identify and neutralize any malicious behavior. The knowledge gained from this course will help participants to better protect themselves, their organizations, and their clients from mobile security threats.
Who this course is for:
- Cyber Security analysts
- Ethical hackers
- Engineering, IT, and computer science students
Instructor
Hello, my name is Mohamad Mahjoub, and I will be your instructor.
With over 17 years of experience in the field of cyber security, I am a skilled and knowledgeable professional with a proven track record of success in implementing and managing information security programs.
I have held various leadership roles, where I have been responsible for developing and implementing strategies to protect against cyber threats. In addition to my technical expertise, I have demonstrated my ability to work with stakeholders across different locations and cultures, and have a strong understanding of various compliance standards and regulations, including ISO 27001:2022, GDPR, PCI DSS v4, NIST CSF, and NIST 800-53".
Over the past few years, I have had the opportunity to teach cyber security to a diverse group of students. The experience has been both challenging and rewarding. The students came from various backgrounds, including computer science, engineering, and business, and had varying levels of knowledge and experience in the field. Many students were highly motivated to learn and were eager to apply the concepts in real-world scenarios. I enjoyed seeing their progress as they developed their skills and knowledge over the course of various programs. The highlight of my experience was seeing many of my students go on to successful careers in the cyber security industry. I am proud of the impact that I have had on their lives and am grateful for the opportunity to have taught them.