Android Malware Analysis - From Zero to Hero
4.3 (118 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
19,992 students enrolled

Android Malware Analysis - From Zero to Hero

All in one course on Android malware analysis
New
4.3 (118 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
19,992 students enrolled
Created by Mohamad Mahjoub
Last updated 6/2020
English
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Perform static malware analysis
  • Perform dynamic malware analysis
  • Detect malicious and data exfiltration code
  • Reverse engineer APKs
  • Understand Android security architecture
  • Understand Android attack surface
Requirements
  • Programming experience, mainly Java and XML
  • Familiar with Kali Linux
  • Basic cybersecurity knowledge
  • Interest in malware analysis
Description

Mobile devices have become part of our daily life and routine. Their use tremendously increased over the last couple of years, so that the have became ubiquitous. Given this fact, the number of malicious mobile applications is tremendously increasing. If you work in cybersecurity, it is imperative to expand your skillset on how to understand and analyze mobile malware.

This course will be your go-to guide on how to reverse engineer Android mobile applications and understand its components. We will begin with a quick introduction on Android security, then we will setup our Kali lab with all the necessary tools, then learn about major mobile attack vectors before getting hands on with actually decompiling and decoding APK files in order to perform static analysis. We will wrap up the course by performing dynamic analysis. The android applications used in this course have live malware, nothing is theoretical !

By the end of the course, you will be confident to utilize Kali tools to spot any data exfiltration or malicious behavior of Android applications.

Who this course is for:
  • Cyber Security analysts
  • Ethical hackers
  • Engineering, IT, and computer science students
Course content
Expand all 29 lectures 01:37:46
+ Android Security Architecture
4 lectures 06:18
Android Platform
01:24
Android Security Architecture
01:54
Android Security Features
01:46
Google Security Features
01:14
+ Mobile App Anatomy
3 lectures 06:21
Android Application Anatomy
02:52
APK File Structure
02:11
DEX File
01:18
+ Setup Your Lab
2 lectures 02:50
Attack Tools Explained
01:00
Setup Your Kali Lab
01:50
+ Acquire Malicious Apps
4 lectures 13:15
Malware Distribution Mechanism
03:38
Acquire Malicious Mobile Apps
04:36
Create a Malicious Mobile App
03:09
Extract a Mobile App From a Phone
01:52
+ Malware Analysis Types
1 lecture 05:06
Static vs Dynamic Malware Analysis
05:06
+ Reverse Engineer a Mobile App
2 lectures 04:09
Unzip vs Decode
01:12
Decode and Decompile Android Apps
02:57
+ Perform Static Malware Analysis
5 lectures 27:07
Keyword Search Techniques
01:44
Dangerous Permissions
01:01
Analysis of a Spyware APK
03:41
Analysis of a Stalkware APK
12:58
Analysis of a Trojan APK
07:43
+ Perform Malware Injection
2 lectures 09:35
Inject Whatsapp Application with Malware
04:10
Inject a Legit APK and Analyze It
05:25