ON-DEMAND, SELF-PACED, 18 CPE CREDITS, In this course we will get introduced to the basics of Malware development and analysis.
18 CPE CREDITS
One of the bigger threats in the recent years of Android’s existence is malware, and in this course we are going to examine the existing Android malware, learn how they work, straight from the source and what harm they can cause. In this course we will get introduced to the basics of Malware development and analysis.
What will you learn?
Basics of malware
Basics of Malware Analysis
Types of malware
History of Android malware
In depth examination and analysis of the most lethal and famous Android malware
What skills will you gain?
Malware examination and Analysis
Android ecosystem exploitation through existing malware
What will you need?
PC with a preferred operating system (Mac OSX 10.5+, Windows 7+, Linux)
What should you know before you join?
Basics of Android Ecosystem
Basics of Java and Programming in general
Basics of XML
The course is self-paced – you can visit the training whenever you want and your content will be there.
Once you’re in, you keep access forever, even when you finish the course.
There are no deadlines, except for the ones you set for yourself.
We designed the course so that a diligent student will need about 18 hours of work to complete the training.
Your instructor: Tom Sermpinis
4 years of experience in Android ecosystem
7 years of experience in Penetration Testing
Java, C++, Python
Editor of “Penetration Testing with Android Devices” and “Penetration Testing with Kali 2.0” courses of PenTest Magazine.
Editor on DeltaHacker Magazine
4 years of blogging on Penetration Testing topics
Android and Hacking Enthusiast
Introduction to malware, Android malware and Malware Analysis
Introduction to malware
Introduction to Android malware
What is malware analysis and how can we use it in the security industry
Famous tools for Android application analysis and Android malware analysis
Android application development and Android malware part 1
Android Malware Analysis
Malware Analysis Types
Malware Analysis Tools
Static Android Analysis
Dynamic Android Analysis Part 1
Android application development and Android malware Part 2
Dynamic Android Analysis Part 2
Results and Analysis
Existing Android malware and Comprehensive Analysis
Interesting Malware of 2016: Viking Horde,RuMMS
Interesting Older Malware: Android Fake.Player, NickiSpy
If you have any questions about the course or the syllabus, please do not hesitate to drop our training coordinator Marta a line at [email protected]!
86 STUDENTS ENROLLED