Android Hacking And Penetration Testing
Android Hacking And Penetration Testing , available at $19.99, has an average rating of 3.6, with 62 lectures, based on 119 reviews, and has 2406 subscribers.
You will learn about By the end of the course , You will learn How to Fuzz applications By the end of the course, students will be able to understand the internals of android and it's security They will be able to pentest android apps in an efficient way By the end of the course, you will learn how to carryout man in the middle attacks in real world They will be in a position to perform real world attacks on Android Devices and Apps By the end of the course , You will undertsand the internals of Android App Reversing and Malware Analysis This course is ideal for individuals who are Students or Pen testers or Developers or Security enthusiasts It is particularly useful for Students or Pen testers or Developers or Security enthusiasts.
Enroll now: Android Hacking And Penetration Testing
Summary
Title: Android Hacking And Penetration Testing
Price: $19.99
Average Rating: 3.6
Number of Lectures: 62
Number of Published Lectures: 62
Number of Curriculum Items: 62
Number of Published Curriculum Objects: 62
Original Price: $79.99
Quality Status: approved
Status: Live
What You Will Learn
- By the end of the course , You will learn How to Fuzz applications
- By the end of the course, students will be able to understand the internals of android and it's security
- They will be able to pentest android apps in an efficient way
- By the end of the course, you will learn how to carryout man in the middle attacks in real world
- They will be in a position to perform real world attacks on Android Devices and Apps
- By the end of the course , You will undertsand the internals of Android App Reversing and Malware Analysis
Who Should Attend
- Students
- Pen testers
- Developers
- Security enthusiasts
Target Audiences
- Students
- Pen testers
- Developers
- Security enthusiasts
Android Hacking and Penetration Testing course is a highly practical and hands on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, You will learn various topics such as Android architecture, Android security model, Android Application Pentesting and Exploitation, Reversing Android applications, static and dynamic analysis of android malware etc. After finishing this course you will be able to perform a Penetration test on a given Android device and its applications
Course Instructors :-
Srinivas
Srinivas is one of the Founders of JSinfosec. He is a Cyber Security Enthusiast, writer and a Speaker. He is one the coauthors of the book "Hacking S3rets", He is an active member of Null Hyderabad. His area of Interests Include Web Application Pentesting, Android application Fuzzing and Pentesting.
John
John is one of the founders of JSinfosec. He is an Infosec researcher, Freelance Pen tester and a blogger. He has more than 5 Years of experience in the field of Information Security. His area of Interests Include Wireless Security and Penetration Testing, Android Security & Forensics
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction To The Course
Lecture 2: About the Instructors
Lecture 3: Course Instructions
Lecture 4: Need For Mobile Security And Owasp Top 10 Mobile Risks
Chapter 2: Lab Setup For The Course
Lecture 1: Lab Setup
Lecture 2: Installing Ubuntu On VMware
Lecture 3: Setting Up An Android Pen-testing Environment on Ubuntu
Chapter 3: Getting Familiar With Android Developer Tools
Lecture 1: Eclipse IDE
Lecture 2: Android Debug Bridge
Chapter 4: Android Architecture And Security Model
Lecture 1: A Brief Intro to Android
Lecture 2: Android booting process
Lecture 3: Android's Architecture
Lecture 4: Android Data Structures and File Systems
Lecture 5: Android Apps
Lecture 6: Android Security Model
Lecture 7: Android Permissions
Lecture 8: Google Bouncer
Chapter 5: Interacting With an Android Device
Lecture 1: Difference Between Android Emulator & Android Device
Lecture 2: Interacting With Android device Via Usb
Lecture 3: All About Rooting
Lecture 4: SSH
Lecture 5: VNC
Lecture 6: Busy Box
Chapter 6: Android Network Analysis
Lecture 1: Setting Up A Proxy for Android Emulator
Lecture 2: Setting Up A Proxy for Android Device
Lecture 3: Installing CA certificate
Lecture 4: Real World MITM and SSL MITM Attacks Part-1
Lecture 5: Real World MITM and SSL MITM Attacks Part -2
Lecture 6: Data Manipulation
Chapter 7: Android Reversing and Malware Analysis
Lecture 1: Apk files in a nutshell
Lecture 2: Introduction to Reverse Engineering
Lecture 3: Reversing to get Source Code of Android Apps
Lecture 4: Reverse Engineering with APKTOOL
Lecture 5: Introduction to Android Malwares
Lecture 6: Dynamic Vs Static Analysis
Lecture 7: Static analysis of Android Malwares
Lecture 8: Dynamic analysis of Android Malwares
Lecture 9: Introduction to Android Tamer
Lecture 10: Dynamic Analysis with DroidBox
Chapter 8: Android Application Pen testing and Exploitation
Lecture 1: Installing JSinfosec Vulnerable Apps
Lecture 2: Introduction to Android App pentesting
Lecture 3: Fuzzing Android Apps with Burp – Proxy
Lecture 4: Fuzzing Android Apps with Burp – Intruder
Lecture 5: Attacking Authentication
Lecture 6: Content Provider Leakage
Lecture 7: Client Side Injection
Lecture 8: Insecure Data Storage – Shared Preferences
Lecture 9: Insecure Data Storage – SQLite Databases
Lecture 10: Unintended Data Leakage
Lecture 11: Broken Cryptography
Lecture 12: Automated Security Assessments with Drozer
Lecture 13: Exploiting Android Devices Using Metasploit
Chapter 9: Android Device And Data Security
Lecture 1: Android Device Protection
Lecture 2: Bypassing Android Locks
Lecture 3: Android Data Extraction
Chapter 10: Using Android as a Pen testing Platform
Lecture 1: A Look Into Commonly Used Pen testing and Hacking Apps
Lecture 2: PWN Pad on Nexus 7
Lecture 3: Kali Linux on Android
Chapter 11: Conclusion And Road Ahead
Lecture 1: Mobile Pen-testing Check List
Lecture 2: Android Security Practices
Lecture 3: Course Summary And Revision
Lecture 4: Conclusion
Instructors
-
Js Infosec
Next-Gen Information Security Training
Rating Distribution
- 1 stars: 15 votes
- 2 stars: 9 votes
- 3 stars: 29 votes
- 4 stars: 34 votes
- 5 stars: 32 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Language Learning Courses to Learn in November 2024
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024