• No products in the cart.

ON-DEMAND, SELF-PACED, 18 CPE CREDITS, In this course we will get introduced to the basics of Malware development and analysis.



One of the bigger threats in the recent years of Android’s existence is malware, and in this course we are going to examine the existing Android malware, learn how they work, straight from the source and what harm they can cause. In this course we will get introduced to the basics of Malware development and analysis.


What will you learn?

    • Basics of malware

    • Basics of Malware Analysis

    • Types of malware

    • History of Android malware

    • In depth examination and analysis of the most lethal and famous Android malware

What skills will you gain?

    • Malware examination and Analysis

    • Malware development

    • Android ecosystem exploitation through existing malware

What will you need?

    • PC with a preferred operating system (Mac OSX 10.5+, Windows 7+, Linux)

    • Android Device

What should you know before you join?

    • Basics of Android Ecosystem

    • Basics of Java and Programming in general

    • Basics of XML

Course format: 

    • The course is self-paced – you can visit the training whenever you want and your content will be there.

    • Once you’re in, you keep access forever, even when you finish the course.

    • There are no deadlines, except for the ones you set for yourself.

    • We designed the course so that a diligent student will need about 18 hours of work to complete the training.

Your instructor: Tom Sermpinis



4 years of experience in Android ecosystem

7 years of experience in Penetration Testing

Java, C++, Python

Editor of “Penetration Testing with Android Devices” and “Penetration Testing with Kali 2.0” courses of PenTest Magazine.

Editor on DeltaHacker Magazine

4 years of blogging on Penetration Testing topics

Android and Hacking Enthusiast


Module 1

Introduction to malware, Android malware and Malware Analysis

Introduction to malware

Introduction to Android malware

What is malware analysis and how can we use it in the security industry

Famous tools for Android application analysis and Android malware analysis

Module 2

Android application development and Android malware part 1

Android Malware Analysis

Malware Analysis Types

Malware Analysis Tools

Static Android Analysis

Dynamic Android Analysis Part 1

Module 3

Android application development and Android malware Part 2

Dynamic Android Analysis Part 2

Results and Analysis

Malware Development

Module 4

Existing Android malware and Comprehensive Analysis

Interesting Malware of 2016: Viking Horde,RuMMS

Interesting Older Malware: Android Fake.Player, NickiSpy

Course Conclusion

If you have any questions about the course or the syllabus, please do not hesitate to drop our training coordinator Marta a line at [email protected]!

Course Reviews


1 ratings
  • 5 stars1
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. Very good!


    Great step by step course – exactly what I was looking for! Thank you!

  • $219.00
  • Course Certificate

Who’s Online

There are no users currently online

Certificate Code

eForensics Magazine's online courses are conducted by experts on our online platform. Courses are designed for hackers, pentesters, IT security experts – professionals and ethusiasts alike. During the course you will not only learn the material and gain the skill, you will also get the unique opportunity to train under the supervision of some of the best experts out there.

The courses are self-paced, and are available on demand. When the course is in session, we release new materials every week, but you can always join in and catch up – when the session ends, everything stays on the website. The added benefit of participating in a session is the hands-on guidance you get from the instructor!

flexible approach; instructor's guidance; course certificate; 18 CPE points for every completed course;

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013