great so far!
Android Malware Analysis - From Zero to Hero
All in one course on Android malware analysis
Course Description
Mobile devices have become part of our daily life and routine. Their use tremendously increased over the last couple of years, so that the have became ubiquitous. Given this fact, the number of malicious mobile applications is tremendously increasing. If you work in cybersecurity, it is imperative to expand your skillset on how to understand and analyze mobile malware.
This course will be your go-to guide on how to reverse engineer Android mobile applications and understand its components. We will begin with a quick introduction on Android security, then we will setup our Kali lab with all the necessary tools, then learn about major mobile attack vectors before getting hands on with actually decompiling and decoding APK files in order to perform static analysis. We will wrap up the course by performing dynamic analysis. The android applications used in this course have live malware, nothing is theoretical !
By the end of the course, you will be confident to utilize Kali tools to spot any data exfiltration or malicious behavior of Android applications.
Who this course is for:
- Cyber Security analysts
- Ethical hackers
- Engineering, IT, and computer science students
Goals
What will you learn in this course:
- Perform static malware analysis
- Perform dynamic malware analysis
- Detect malicious and data exfiltration code
- Reverse engineer APKs
- Understand Android security architecture
- Understand Android attack surface
Prerequisites
What are the prerequisites for this course?
- Programming experience, mainly Java and XML
- Familiar with Kali Linux
- Basic cybersecurity knowledge
- Interest in malware analysis

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
2 Lectures
-
Introduction 02:50 02:50
-
Why Android 01:31 01:31
Android Security Architecture
4 Lectures

Mobile App Anatomy
3 Lectures

Mobile Malware Types
1 Lectures

Setup Your Lab
2 Lectures

Acquire Malicious Apps
4 Lectures

Malware Analysis Types
1 Lectures

Reverse Engineer a Mobile App
2 Lectures

Perform Static Malware Analysis
5 Lectures

Perform Malware Injection
2 Lectures

Perform Dynamic Malware Analysis
3 Lectures

Instructor Details

Mohamad Mahjoub
Cyber Security ExpertHi! I’m Mohamad; you might call me a bit of a computer geek; just a bit.
After spending 5 years working as an IT Project Manager for a leading multinational pharmaceutical company, I moved to the Banking sector to attain a senior role in the Information Security Audit field for 4 years; it was such a great experience. I have then relocated to Dubai to join a Dubai Smart Government entity for 3 years as an Information Security Manager. Currently I’m working as an Information Security Consultant for different companies in Dubai, Oman, and Bahrain. I have a total of 15 years of experience in the Information Technology field, with a focus on Information Security.
Since 2012, I have delivered many IT courses and topics to technical and non-technical audience, varying from fresh graduates, IT professionals, senior and executive management, and business owners. In a world of ubiquitous technology, I believe that Information Security is more important than ever, and it is something that everyone should be aware of, therefore it should not only be exclusive to the privileged few. I’m passionate about making this happen through spreading my knowledge to people like you. I’m a certified CISSP, CISA, PMP, ITIL, and ISO 27005 Risk Manager and I have a Masters in Computer Science from the Lebanese American University (LAU).
I hope you will enjoy my course.
Course Certificate
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

Our students work
with the Best


































Feedbacks
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now