Hacking the Android APK Training
Learning Objectives
Introduction to Android and Mobile Security Fundamentals
Into to Android Applications and the APK
Android Application Hacking Use Cases
Setting Up Your Android Test Environment
Static Analysis
Dynamic Analysis
Forensic Analysis
Intermediate and Advanced Topics
Example APK Analysis Walkthroughs
Capstone: Hacking the Android APK CTF Tournament
Course Schedule
Introduction to Android and Mobile Security Fundamentals
Into to Android Applications and the APK
Android Application Hacking Use Cases
Setting Up Your Android Test Environment
Static Analysis
Dynamic Analysis
Forensic Analysis
Intermediate and Advanced Topics
Example APK Analysis Walkthroughs
Capstone: Hacking the Android APK CTF Tournament
Training program
Required Materials
Students will need to bring their own Windows/Linux/macOS laptop with 8 GB RAM, WiFi, USB, and VirtualBox or VMware installed. A VM will be made available to attendees for download before class, as well as available on USB flash drives at the start of class. Physical, rooted Android test devices will be available for use by students for the duration of the training (depending on class size).
Average Salary
Level
Beginner/Intermediate
Pre-Requisites
Previous mobile development or general pen testing experience is helpful, but not required.
Register For Class
No courses available at this time
|
NOT SURE WHERE TO START?
Private Team Training
Enrolling at least 3 people in this course? Consider bringing this (or any course that can be custom designed) to your preferred location as a private team training
For details, call 704-554-3827
Come Learn With Intellectual Point
Price Match Guarantee!
We will match Competitor’s Price Quote.
Call for more details 703-554-3827
About the Instructor:
Ben brings a diverse background in cybersecurity, IT, law, and law enforcement to Polito. After earning his JD from William & Mary School of Law in 2010 and providing IT and e-discovery support to law firms, Ben joined Booz Allen Hamilton as a cybersecurity consultant in 2012. While a member of Advanced Persistent Threat (APT) hunt teams assigned to commercial and federal clients, Ben sharpened his network security monitoring, forensics, incident response, malware analysis, cyber threat intelligence, and security architecture skills. He has earned the CISSP, GIAC Certified Forensic Analyst (GCFA), GIAC Web Application Penetration Tester (GWAPT), and Splunk Certified Power User certifications. Ben is a member of the Maryland bar and volunteers at a pro bono legal clinic.