Companies Home Search Profile

Learn Reverse Engineering With Android Malware Analysis

Focused View

James Stevenson

35:08

7 View
  • 1. Introduction.mp4
    01:31
  • 2. Tooling.mp4
    02:35
  • 1.1 ios-and-android-re.pdf
  • 1.2 reverse-engineering.pdf
  • 1. Introduction to Android Reverse Engineering.mp4
    02:34
  • 2.1 malware-book.pdf
  • 2.2 malware-intro.pdf
  • 2. Introduction to Android Malware Analysis.mp4
    06:46
  • 3. Android Malware Analysis 101.html
  • 4. Introduction to obfuscation in Android.mp4
    03:19
  • 5.1 obfuscation.pdf
  • 5. Android Obfuscation 101.html
  • 1.1 androidmanifest.zip
  • 1.3 mainactivity.zip
  • 1.4 simplemalware.zip
  • 1. Building and reverse engineering simple malware.mp4
    03:55
  • 2.1 androidmanifest.zip
  • 2.2 mainactivity.zip
  • 2.3 simplephish.zip
  • 2. Building a simple phishing application.mp4
    03:26
  • 3. Spam Malware Example.html
  • 1.1 example config.zip
  • 1. Retrieving applications from a device.mp4
    02:54
  • 2. Using machine learning to identify malware.mp4
    02:13
  • 3. DroidDetective and AutoDroid 101.html
  • 1. Exodus malware case study.mp4
    04:47
  • 2. Reverse engineering Exodus malware.html
  • 1. Thanks and wrap up.mp4
    01:08
  • 2. Knowledge Catchup.html
  • 3. Final Challenge.html
  • Description


    The building blocks for starting a career in malware analysis by building, taking apart, and understanding malware

    What You'll Learn?


    • Learn how Android applications are developed
    • Learn how to reverse engineer Android applications and malware
    • Learn how to extract applications and malware from a running device
    • Gain access to premium cheat sheets, study guides, and books
    • Develop your skills with challenges that will assess your understanding through the course

    Who is this for?


  • People with a foundation knowledge in computing that want to develop their skills in offensive security, vulnerability research, and reverse engineering
  • People who are interested in how Android and Android malware work
  • What You Need to Know?


  • A foundation knowledge of computing - including how to download and install tools, how to use a command line interface, and experience with a programming language such as Python.
  • An understanding of what Android is and how Android is used by end users.
  • More details


    Description

    During this course you'll develop the skills required to reverse engineer Android malware and applications, use both automated and manual tools and approaches, as well as five into multiple case studies reviewing existing malware.

    By the end of this course you'll be able to create simple Android applications, reverse engineer your own and the applications of others, identify any potential malicious activity in these applications.

    There are several quiz and assignment style challenges through the course designed to support your learning and provide practical learning opportunities.

    This course will teach you all you need to know about Android reverse engineering, however, it is advised to come into this course with an already existing knowledge of programming and computational skills (such as using a CLI and computational thinking).


    About The Author:

    James Stevenson has been working in the programming and computer security industry for over 5 years, and for most of that has been working as an Android software engineer and vulnerability researcher. Prior to this, James graduated with a BSc in computer security in 2017. James has featured articles on both personal websites and industry platforms such as Infosecurity Magazine - covering topics from security principles to android programming and security to cyber terrorism. James is a full-time security researcher, part-time PhD student, and occasional conference speaker. Outside of Android internals, James’ research has also focused on offender profiling and cybercrime detection capabilities.

    Who this course is for:

    • People with a foundation knowledge in computing that want to develop their skills in offensive security, vulnerability research, and reverse engineering
    • People who are interested in how Android and Android malware work

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    James Stevenson
    James Stevenson
    Instructor's Courses
    James Stevenson has been working in the programming and computer security industry for over 5 years, and for most of that has been working as an Android software engineer and vulnerability researcher. Prior to this, James graduated with a BSc in computer security in 2017. James has featured articles on both personal websites and industry platforms such as InfoSecurity Magazine - covering topics from security principles to android programming and security to cyber terrorism. James is a full-time security researcher, part-time PhD student, and occasional conference speaker. Outside of Android internals, James’ research has also focused on offender profiling and cybercrime detection capabilities.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 11
    • duration 35:08
    • English subtitles has
    • Release Date 2024/02/14