Brief Summary
This course dives into the world of mobile app security, especially focusing on Android. It mixes theory with practical tools and techniques to help you understand and analyze Android applications effectively, including security measures and pentesting strategies.
Key Points
-
Balance of theory and hands-on experience
-
Tools for analyzing mobile applications
-
Focus on Android OS architecture and security
-
Discussion of pentesting and malware analysis
-
Best practices for mobile app security
Learning Outcomes
-
Understand Android's architecture and how it impacts security
-
Get comfortable with tools for security analysis and reverse engineering
-
Learn to pentest Android apps with practical techniques
-
Identify common security issues like data leakage
-
Adopt best practices to secure Android applications
About This Course
Has the right balance of theory and hands-on. Good set of tools discussed. Offered by leaders in Mobile App Security.
If you at any point of time in your career or academia surfaced information security, you know for a fact that security analysis is not only about thorough understanding of a system but also includes a good list of tools and techniques to analyze that particular system. Unlike network and web, mobile security is a recent phenomenon. In order to analyze mobile application, one should understand the underlying architecture, security model, development frameworks and the relevant tools.
This course deals with applications within the most widely used mobile OS, Android. The course introduces underlying Android architecture, its permission model and the default security measures in place. It deals with developer tools like Eclipse, Android Studio, Android Debug Bridge or ADB, UI Automator and Monkey Runner, along with tools and techniques for Network Analysis.
As a part of reversing and malware analysis, static and dynamic techniques have been discussed. Pentesting an Android App is has also been discussed. Issues like unintended data leakage, insecure data storage and tools like Burp Intruder & Metasploit have also been covered. The course concludes by discussing Android best practices for security.
To conclude, this course deals with Android security concepts and discusses the relevant tools in detail to exploit an Android application.
Understand Android's Architecture and Security Model
Get familiar with tools for development, reverse engineering and security analysis
Pentesting Android Apps
Zhaoming Y.
very useful general introduction