Mobile Security: Reverse Engineer Android Apps From Scratch
What you'll learn
- Android Malware Reverse Engineering
- How to Create a Ransomware Decryption Tool
- Mobile Security
- Static Analysis
- Dynamic Analysis
- Android App development fundamentals
This is an introductory course suitable for cyber security newcomers as well as cyber security professionals who would like to dive into the world of mobile security.
In recent years, Android has established itself as a leader in the mobile OS market. For this reason, it is a common target of abuse among cyber-criminals.
This course will provide students with the ability to set up an analysis environment, allowing them to analyse suspicious Android apps and determine whether or not they are malicious. The syllabus assumes that the student has little or no knowledge of Android security. It therefore provides the fundamentals not only on Android security, but on Android applications in general.
The course will take students through the process of developing a basic Android application, which will provide insight into the inner workings of an Android APK. Upon completion, students will have their own analysis environment along with the knowledge required to analyse suspicious APKs.
-Intro to Android
-Developing a Basic Android App
-Analyzing Android Apps
-Case Study: Analyzing an actual ransomware and developing a decryption tool
Who this course is for:
- Students interested in Cyber Security and Android Reverse Engineering
FlipCortex is a company specialized in ethical hacking and cyber security training. We teach awareness and novel ways of developing cyber security related skills so anyone can test and secure systems against advanced malicious actors.
FlipCortex can protect you from the latest cyber attacks before reaching their final target: your clients, your employees & your data; ultimately saving you money, resources and effort.
Provide a safe digital experiences to your clients through your website or your mobile application.
We can safeguard your assets from targeted attacks that evade traditional defense techniques.