MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

Android Hacking And Penetration Testing

Course Summary

Learn Android Hacking and Penetration Testing from the absolute basics

  • +

    Course Syllabus

    • Introduction
      • Introduction To The Course
      • About the Instructors
      • Course Instructions
      • Need For Mobile Security And Owasp Top 10 Mobile Risks
    • Lab Setup For The Course
      • Lab Setup
      • Installing Ubuntu On VMware
      • Setting Up An Android Pen-testing Environment on Ubuntu
    • Getting Familiar With Android Developer Tools
      • Eclipse IDE
      • Android Debug Bridge
    • Android Architecture And Security Model
      • A Brief Intro to Android
      • Android booting process
      • Android's Architecture
      • Android Data Structures and File Systems
      • Android Apps
      • Android Security Model
      • Android Permissions
      • Google Bouncer
    • Interacting With an Android Device
      • Difference Between Android Emulator & Android Device
      • Interacting With Android device Via Usb
      • All About Rooting
      • SSH
      • VNC
      • Busy Box
    • Android Network Analysis
      • Setting Up A Proxy for Android Emulator
      • Setting Up A Proxy for Android Device
      • Installing CA certificate
      • Real World MITM and SSL MITM Attacks Part-1
      • Real World MITM and SSL MITM Attacks Part -2
      • Data Manipulation
    • Android Reversing and Malware Analysis
      • Apk files in a nutshell
      • Introduction to Reverse Engineering
      • Reversing to get Source Code of Android Apps
      • Reverse Engineering with APKTOOL
      • Introduction to Android Malwares
      • Dynamic Vs Static Analysis
      • Static analysis of Android Malwares
      • Dynamic analysis of Android Malwares
      • Introduction to Android Tamer
      • Dynamic Analysis with DroidBox
    • Android Application Pen testing and Exploitation
      • Installing JSinfosec Vulnerable Apps
      • Introduction to Android App pentesting
      • Fuzzing Android Apps with Burp - Proxy
      • Fuzzing Android Apps with Burp - Intruder
      • Attacking Authentication
      • Content Provider Leakage
      • Client Side Injection
      • Insecure Data Storage - Shared Preferences
      • Insecure Data Storage - SQLite Databases
      • Unintended Data Leakage
      • Broken Cryptography
      • Automated Security Assessments with Drozer
      • Exploiting Android Devices Using Metasploit
    • Android Device And Data Security
      • Android Device Protection
      • Bypassing Android Locks
      • Android Data Extraction
    • Using Android as a Pen testing Platform
      • A Look Into Commonly Used Pen testing and Hacking Apps
      • PWN Pad on Nexus 7
      • Kali Linux on Android
    • Conclusion And Road Ahead
      • Mobile Pen-testing Check List
      • Android Security Practices
      • Course Summary And Revision
      • Conclusion

Course Fee:
USD 99

Course Type:


Course Status:



1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top